mfa

Why Video Conferencing Is More Productive than In-Person Meetings

Why Video Conferencing Is More Productive than In-Person Meetings Whether you’ve been working remotely for years or are transitioning, virtual meetings can encourage better engagement and collaboration. Being in the same room with someone doesn’t necessarily mean you’ll have a fruitful meeting. In fact, there are lots of stats and data that support the idea that video conferencing is more productive than in-person meetings. Global catastrophe or not, the revolution of remote work will continue to grow as companies realize its effectiveness and efficiency. Let’s look at why video conferencing can deliver a more productive atmosphere for working together. A Look at the Data on Video Conferencing Video conferencing has been growing …

Why Video Conferencing Is More Productive than In-Person Meetings Read More »

Why Video Conferencing Is More Productive than In-Person Meetings

Security Awareness Deployment Guide – Securely Working at Home

Security Awareness Deployment Guide Securely Working at Home Executive Summary As a result of Coronavirus, many organizations are finding themselves transitioning their workforce to work from home. This can be a challenge as many organizations lack the policies, technology and training to secure a remote workforce. In addition, many employees may be unfamiliar or uncomfortable with the idea of working from home. The purpose of this guide is to enable you to quickly train those people to be secure as possible. If you have any questions on how to use this guide, reach out to us at support@sans.org. Since your workforce is most likely going through a great deal of …

Security Awareness Deployment Guide – Securely Working at Home Read More »

Security Awareness Deployment Guide Securely Working at Home

IDC PlanScape: Deploying Multifactor Authentication

IDC PlanScape: Deploying Multifactor Authentication EXECUTIVE SUMMARY Multifactor authentication provides organizations with an effective security control that overcomes the weaknesses of knowledge-based authentication and protects network, application, and data assets in an increasingly sophisticated threat environment. By combining passwords with physical devices and/or biometric measurements, organizations add a layer of strong security and protect themselves against password theft. Recent advances in multifactor authentication make this technology more accessible to nontechnical end users and allow widespread deployment throughout the organization. Using multifactor authentication may now be as simple as clicking a button on a pop-up window that appears on the smartphone that a user was already carrying. The simplicity of this …

IDC PlanScape: Deploying Multifactor Authentication Read More »

IDC PlanScape Deploying Multifactor Authentication

5 Identity Attacks That Exploit Your Broken Authentication

5 Identity Attacks That Exploit Your Broken Authentication Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter expands to wherever the user is logging in from. In other words, the identity becomes the perimeter. Threat agents have recognized this as a security gap and are exploiting the natural proclivity for your employees to trust an inbound email from a familiar source, or their tendency to reuse …

5 Identity Attacks That Exploit Your Broken Authentication Read More »

5 Identity Attacks That Exploit Your Broken Authentication
Scroll to Top
error: