Information security awareness: 4 trends for 2021
Information security awareness: 4 trends for 2021 As much as technological resources have advanced with the digital transformation, their effectiveness can still be hindered by human error. A large portion of data breaches, intrusions, and cyber-attacks stem from basic end-user errors. These user errors are the primary target for attackers looking to infiltrate business networks. Information security awareness is gaining more importance in the […]
Learn all about the ransomware attack against the Colonial Pipeline and find out how to prevent it
Learn all about the ransomware attack against the Colonial Pipeline and find out how to prevent it Founded in 1962 and headquartered in Alpharetta, Georgia, Colonial Pipeline is one of the largest private pipeline operators in the United States. Colonial Pipeline is responsible for the supply of gasoline, diesel, and oil for military and civilian […]
World Internet Day: How much does a cyber incident cost?
World Internet Day: How much does a cyber incident cost? In 2017, the UN established May 17 as the celebration of International Internet Day; its objective was to promote awareness about the use of technology, network safety, and to promote digital inclusion. In an increasingly connected and mobile world, it is becoming increasingly important to […]
Essential resources for a PAM solution
Essential resources for a PAM solution Privileged credentials are the preferred targets of cyber attackers. According to Forrester, at least 80% of all data breaches are the result of compromised privileged credentials. Privileged, unmonitored, and unmanaged accounts give cybercriminals unrestricted access to the Organizations’ IT infrastructure through a single terminal. Privileged Access Management (PAM) is […]
World password day – tips to protect them
World password day: tips to protect them World Password Day is celebrated every year on the first Thursday of May. According to a recent report, more than 80% of hacker breaches occur due to weak or stolen passwords. This proves that the first step in protecting information and resources is through the adoption of secure […]
Strengthen your company’s security with the Zero Trust model
Strengthen your company’s security with the Zero Trust model Data is an Organization’s most important asset. Finding the balance between mobility and data security is a challenge in the modern hyperconnected world, especially considering the current reality where there is no more perimeter. More often, users and data are operating outside traditional IT defenses, placing a new burden on the […]
Privilege Management: allowing access to what is essential
Privilege Management: allowing access to what is essential Privilege Management is a cybersecurity practice that allows companies’ ‘IT departments to control users’ access privileges to information, based on assigned rules (groups, roles, business rules etc.). It ensures that employees have the necessary access to perform their routine work (the applications and controls required for the function), ensuring the […]
Your Passwords are Not Secure
Your Passwords are Not Secure You have secrets. We all do. Yesterday, your accounts were protected by a seven-digit password. Today, they are unlocked and might be used to hurt you. Your credit card number, your email, your bank account. You think your secrets are safe online, but they are being targeted on a massive […]
Access security is a priority in the cloud
Access security is a priority in the cloud The pandemic has accelerated the migration process of many companies to the cloud. In search of mobility and maintaining business continuity, many systems and applications have been moved to this environment. With the lack of preparedness for most companies in the migration process, two problems occurred: the […]
Identity protection for more resilient businesses and secure access
Identity protection for more resilient businesses and secure access The pandemic has accelerated digital transformation and the need for organizations to adapt to rapid technological, organizational and social changes. The scenario favored an increase in concern with Identity Management (IAM) and Access Privilege Management (PAM). Mainly due to the adoption of the cloud, business processes needed […]