Archive for the ‘Rethink Remote Access’ Category

For all the talk of the Internet of Things (IoT) and machine-to-machine (M2M) communications making our lives easier, there always seems to be a cautionary tale involving security of these devices around every corner. Take self-driving cars – something it seems like almost everyone would want. That is, until last summer, when the cybersecurity community […]

Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are? You don’t have to be a savvy hacker to figure them out – “123456” and “password” have again topped the list this year. The good news is the prevalence […]

It doesn’t matter if employees leave a company on unpleasant terms or quite amicably – it is absolutely essential that enterprises have solid, well-defined termination processes in place, and that they’re followed to the letter. In their final days at a company, employees can demand various personal documents, depending on local regulations. A final paycheck […]

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker to slip through the victim’s cyber defenses. When it comes to remote access in particular, network security is even more dependent on technology like VPNs, and […]

Even just a decade or two ago, it would have been unfathomable to think that sometime in the near future, workers would be upset that their employer was requiring them to work in the same office as the rest of their team. Then again, so too would the concept of BYOD and the idea that […]