Ahmed Sharaf

Best Practices for Safe and Secure Meetings with OnlineMeeting

Here at XBAND, we’re dedicated to providing users with a safe and secure video conferencing experience from their office, home, and anywhere in between. Read this blog to learn how to keep your meetings secure when using XBAND OnlineMeeting as a standalone service or with our XBAND Elevate service. Before Your Meeting There is a common misconception that meeting security is only relevant while meetings are taking place–this is false. With OnlineMeeting, one of the best ways to secure your meetings is when you are scheduling them. When hosts send out meeting invites, their attendees receive a meeting code to join the meeting­­. Typically, this code stays the same for …

Best Practices for Safe and Secure Meetings with OnlineMeeting Read More »

OnlineMeeting Best Practices

Four Myths About Credential Phishing You Can’t Ignore

Four Myths About Credential Phishing You Can’t Ignore When it comes to credential phishing, knowledge is power. We tend to underestimate the impact of phishing on the enterprise and assume our existing defense strategies are sufficient to combat these attacks. To understand phishing means understanding one of the most common methods used by attackers to breach and maneuver within our networks, and to do that we need to dispel a few myths. Read this white paper to learn about phishing tactics and the key steps to building a complete security strategy that protects against credential phishing. Suggested resources for additional research: Analyst Research: IDC Planscape: Deploying Multi-Factor Authentication Customer Journey: Fieldpoint Private …

Four Myths About Credential Phishing You Can’t Ignore Read More »

Four Myths About Credential Phishing You Can’t Ignore

MFA, Deploying Multifactor Authentication

Deploying Multifactor Authentication (MFA) EXECUTIVE SUMMARY Multifactor authentication (MFA) provides organizations with an effective security control that overcomes the weaknesses of knowledge-based authentication and protects network, application, and data assets in an increasingly sophisticated threat environment. By combining passwords with physical devices and/or biometric measurements, organizations add a layer of strong security and protect themselves against password theft. Recent advances in multifactor authentication make this technology more accessible to nontechnical end users and allow widespread deployment throughout the organization. Using multifactor authentication may now be as simple as clicking a button on a pop-up window that appears on the smartphone that a user was already carrying. The simplicity of this …

MFA, Deploying Multifactor Authentication Read More »

Deploying Multifactor Authentication MFA

Security Awareness Deployment Guide – Securely Working at Home

Security Awareness Deployment Guide Securely Working at Home Executive Summary As a result of Coronavirus, many organizations are finding themselves transitioning their workforce to work from home. This can be a challenge as many organizations lack the policies, technology and training to secure a remote workforce. In addition, many employees may be unfamiliar or uncomfortable with the idea of working from home. The purpose of this guide is to enable you to quickly train those people to be secure as possible. If you have any questions on how to use this guide, reach out to us at support@sans.org. Since your workforce is most likely going through a great deal of …

Security Awareness Deployment Guide – Securely Working at Home Read More »

Security Awareness Deployment Guide Securely Working at Home

Cyberspace Solarium Commission

Cyberspace Solarium Commission Our Strategy After conducting an extensive study including over 300 interviews, a competitive strategy event modeled after the original Project Solarium in the Eisenhower administration, and stress tests by external red teams, the Commission advocates a new strategic approach to cybersecurity: layered cyber deterrence. The desired end state of layered cyber deterrence is a reduced probability and impact of cyberattacks of significant consequence. The strategy outlines three ways to achieve this end state: Shape behavior. The United States must work with allies and partners to promote responsible behavior in cyberspace. Deny benefits. The United States must deny benefits to adversaries who have long exploited cyberspace to their advantage, to American …

Cyberspace Solarium Commission Read More »

Cyberspace Solarium Commission
Scroll to Top
error: Alert: Content selection is disabled!!