In May of 2021, HP Wolf published a cybersecurity study that centered on revealing risks that are driven by the surge in remote work. 82% of global office workers have worked from home more since the start of the pandemic, and that has been reported as having great...
Secure remote access is the process of “having location-agnostic connectivity among enterprise users and centralized applications, resources, and systems, whether cloud-based or on premises,” according to TechTarget Search Security. Examples of secure remote access...
What do you think makes a good cybersecurity program? Is it quick response times to attacks, great analytics, magic? Let’s talk about it. Threat & Vulnerability Assessment When it comes to cybersecurity, there is no single right answer. We are fighting an...
We mentioned in our previous blog article about the impact of remote work on cybersecurity that password practices are even more important than they were before, since your teams are on remote networks that often have a range of cybersecurity measures in place that...
There are many types of firewall technologies, and choosing the best fit for your business can be tricky. There’s no clear, one-size-fits-all solution and each firewall type has its own benefits and limitations. So let’s break down some top factors to consider when...
On Friday, May 7, 2021, the Colonial Pipeline, a major fuel pipeline that supplies 45% of the jet fuel, gasoline, and heating oil the East Coast consumes, was hacked. Let’s talk about what happened and what the hack means for the future of cybersecurity in...