Welcome back to our ongoing series on the 2018 General Data Protection Regulation, where we dive into the upcoming EU regulation and how it will impact the way we use remote access tools. Today our focus is on data minimization, at the heart of which is the general rule: process data only as needed.… Read on
During the early morning hours of October 25th, Netop released an update to the Netop Remote Control Portal. This update introduces a new audit logging capability, providing users with a thorough record of all portal based activities.
Audit logs are an invaluable tool for monitoring the security and integrity of your systems.… Read on
Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls.
“Most organizations granting remote privileged application or operating system-level access to third-party users leave gaps that introduce significant security risks“
Gartner research “How to Secure Remote Privileged Access for Third-Party Technicians”
- Malicious remote access represents “a significant hazard with networked POS devices,” accounting for 62% of incidents within POS environments.
If you don’t have a remote support solution installed on your ATM fleet, you are likely spending far too much on maintenance and upkeep of your equipment. Our latest infographic calculates how much you could save by eliminating unnecessary service trips with Netop Remote Control, based on our conversations with NCR, Diebold, as well as banks and service providers across the country.… Read on
Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report.
Source: 2017 Trustwave Global Security Report
The number of incidents in corporate and internal network environments increased from 41% in 2015 to 43% in 2016, indicating companies need to review and improve network security controls to ensure their data is guarded against cyber-attacks.… Read on