In the previous post, we were discussing how to manage emergency access to IT resources when an administrator is away. The ‘Super-Administrator’ role in Password...
How do you manage emergency access to IT resources when an administrator is away?
Assume one of the administrators in your IT department happens to be away from office and an emergency situation arises when you need to access...
Bridge the gap between IT Operations & IT Security
Traditionally, IT operations and IT Security have remained at loggerheads. IT operations team is tasked with the responsibility of carrying out the the day-to-day activities,...
Data Breach at LinkedIn: Time to Seriously Consider Using a Password Manager!
Just in the last post, we were discussing how even some of the world’s mightiest enterprises were falling prey to hackers. Now comes the bad...
Even UK Ministry of Defence Not Immune to Cyber-Attack!
Even some of the world’s mightiest organizations are not immune to cyber-attacks. Just a few days ago, British Military’s head of cyber security Major General...
Password Manager Pro offers rock solid security, reveals penetration test by Seibert Media
It goes without saying – software products operating in the IT Security space should offer rock solid security. These products should be devoid of holes...
Success Story: Netherland’s Top Research University Consolidates & Streamlines Privileged Password Management Processes using Password Manager Pro
Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data,...
Launch secure, browser-based Windows RDP, SSH and Telnet sessions from Password Manager Pro
Launching remote login sessions: Ease of use Vs Security Organizations are deploying privileged password management solutions to mitigate cyber threats and control access to sensitive...
Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]
In the previous post , we analyzed the magnitude of medicare fraud, protected health information stakeholders and their responsibilities. Let us now examine the causes...