Working from home has become our new normal, with many of our jobs being performed remotely. The experience of working remotely can be as seamless as it was from our workplace,...
Managing VPN connections will help businesses face today’s adversity as well as prepare for tomorrow’s opportunity
The onslaught of the novel COVID-19 has caught businesses off guard, sending many of them into a tailspin. To survive this, most businesses are considering the idea of remote work,...
SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified
In the previous blog of this series, we discussed how monitoring SQL Server activities helps secure databases. The database security can further be reinforced by carefully configuring the authentication and authorization mechanisms for database accesses. In this...
Five worthy reads: Implementing a successful remote work environment
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how...
COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely
Businesses are shifting their operations to a remote work model in the midst of the COVID-19 lockdown. While this enables business to generally continue...
Five worthy reads: Keeping a close eye on cybersecurity while working remotely
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of...
Security tips for work-from-home organizations [Webinar]
Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote working due to the recent COVID-19 pandemic. To be safe and to practice social...
File shadowing: The key to a swift recovery from USB and file-based attacks
USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due...
COVID-19: Remote patch management struggles and solutions to secure remote users
Crisis or not, keeping endpoints patched against known and emerging vulnerabilities remains one of the top challenges IT admins face. With the new work-from-home norm in response to COVID-19, patch...