The search found 3769 results.
Blog
Just one weak link in your supply chain could lead to a potential security disaster. A third-party data breach could cause your organization financial loss, regulatory issues, and damage to your reputation. Here's three easy steps you can take to reduce your third-party vendor risks.
Blog
Current cybersecurity and data protection best practices are far beyond the days of just employing a perimeter defense. Threats are coming in from all sides and old castle-and-moat methodologies are outdated and vulnerable. All it takes is a look at the headlines to see how hackers are able to leverage privileged accounts to gain access to critical data.
Blog
Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks. Find out more in this post.
Blog
Remote access has become a necessity in business environments. Whether it’s employees working from home or third-party vendors that need to access a customer network, remote access needs to provide secure and reliable connectivity—keyword here being secure.
Blog
Chances are you know of, or have even used, Okta. The authentication and identity management software is almost ubiquitous, offering multi-factor authentication for single users across large organizations. Unfortunately, Okta was the subject of a security breach back in January.
Blog
Using third parties is nearly inevitable in today’s business landscape. Most organizations need to outsource some of their operations, whether it’s on a large or small scale.
Blog
Healthcare organizations’ number one priority is patient care. They’re in the business of helping patients, so most of their time, energy, and resources are allocated there. However, cybersecurity is becoming an increasingly important topic for healthcare organizations.
Blog
As society enters a fourth industrial revolution, the manufacturing industry is facing vast, rapid changes. Those changes are marked by both innovation, productivity and efficiency improvements, and new, unforeseen risks.
Blog
Third parties continue to be one of the biggest cybersecurity risks to an organization. Last year, nearly half of organizations experienced a data breach caused by a third party and with ransomware on the rise, businesses need to lock down their third-party security strategy before a hacker finds a vulnerable access point.
Blog
Despite warnings from every cybersecurity professional, passwords are still being shared, compromised, and ineffectively managed. 66% of individuals are using the same password across devices and applications. 42% rely on sticky notes to manage passwords. And shockingly, 59% of IT professionals rely on memory to manage their corporate credentials.