Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into how...
COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely
Businesses are shifting their operations to a remote work model in the midst of the COVID-19 lockdown. While this enables business to generally continue...
Five worthy reads: Keeping a close eye on cybersecurity while working remotely
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of...
Security tips for work-from-home organizations [Webinar]
Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote working due to the recent COVID-19 pandemic. To be safe and to practice social...
File shadowing: The key to a swift recovery from USB and file-based attacks
USB devices are undeniably valuable, but they can be dangerous. On one hand, they are useful in transporting enterprise-critical data, but on the other, they can wreak havoc if misplaced, corrupted due...
COVID-19: Remote patch management struggles and solutions to secure remote users
Crisis or not, keeping endpoints patched against known and emerging vulnerabilities remains one of the top challenges IT admins face. With the new work-from-home norm in response to COVID-19, patch...
Best practices to ensure data security while working remotely
Coronavirus has disrupted daily life for so many around the world in a shockingly short span of time. Lifestyles have shifted. A new normal, albeit...
Introducing our free Secure Remote Access Toolkit for IT teams
The global corporate landscape is on the brink of a complete premises lockdown in light of the COVID-19 crisis. Service disruption is inevitable, and enterprises’...
Shining a light on Brazil’s new data protection law
In the golden age of technology, our most valuable asset is data. Neglecting to implement effective data security measures leaves data vulnerable to theft and manipulation. This is why many countries are coming up with new data protection laws...