Managing VPN connections will help businesses face today’s adversity as well as prepare for tomorrow’s opportunity

vpn best practices

The onslaught of the novel COVID-19 has caught businesses off guard, sending many of them into a tailspin. To survive this, most businesses are considering the idea of remote work, and some have already implemented work from home policies.


General 2 min read Read

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities helps secure databases. The database security can further be reinforced by carefully configuring the authentication and authorization mechanisms for database accesses. In this blog, we’ll briefly …

General 2 min read Read

Five worthy reads: Implementing a successful remote work environment

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how organizations are increasingly adopting a remote work model, and how they can equip themselves to

General 2 min read Read

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely


Businesses are shifting their operations to a remote work model in the midst of the COVID-19 lockdown. While this enables business to generally continue as normal, there has also been a rise in cyberattacks because of this shift as …

General 4 min read Read

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of creating and enforcing a solid cybersecurity strategy for employees who work remotely.

From embracing …

General 3 min read Read

Monitoring critical business applications while working remotely

With a huge number of employees around the globe working remotely during the COVID-19 pandemic, delivering uninterrupted business services to customers has become a major challenge. This requires strict monitoring of all critical business applications in order to accommodate an …

General 3 min read Read

Security tips for work-from-home organizations [Webinar]

Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote working due to the recent COVID-19 pandemic. To be safe and to practice social distancing, your organization might have also adopted telecommuting. However, with the sudden shift to remote …

General 2 min read Read

File shadowing: The key to a swift recovery from USB and file-based attacks

USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due to a human or hardware-related error, or stolen. …

General 2 min read Read

COVID-19: Remote patch management struggles and solutions to secure remote users

Crisis or not, keeping endpoints patched against known and emerging vulnerabilities remains one of the top challenges IT admins face. With the new work-from-home norm in response to COVID-19, patch management sounds next to impossible for many IT admins.

Leaving …

General 4 min read Read