Information security awareness: 4 trends for 2021

Information security awareness: 4 trends for 2021 As much as technological resources have advanced with the digital transformation, their effectiveness can still be hindered by human error.  A large portion of data breaches, intrusions, and cyber-attacks stem from basic end-user errors. These user errors are the primary target for attackers looking to infiltrate business networks.   Information security awareness is gaining more importance in the […]

World Internet Day: How much does a cyber incident cost?

World Internet Day: How much does a cyber incident cost? In 2017, the UN established May 17 as the celebration of International Internet Day; its objective was to promote awareness about the use of technology, network safety, and to promote digital inclusion. In an increasingly connected and mobile world, it is becoming increasingly important to […]

Essential resources for a PAM solution

Essential resources for a PAM solution Privileged credentials are the preferred targets of cyber attackers. According to Forrester, at least 80% of all data breaches are the result of compromised privileged credentials. Privileged, unmonitored, and unmanaged accounts give cybercriminals unrestricted access to the Organizations’ IT infrastructure through a single terminal. Privileged Access Management (PAM) is […]

World password day – tips to protect them

World password day: tips to protect them World Password Day is celebrated every year on the first Thursday of May. According to a recent report, more than 80% of hacker breaches occur due to weak or stolen passwords. This proves that the first step in protecting information and resources is through the adoption of secure […]

Strengthen your company’s security with the Zero Trust model

Strengthen your company’s security with the Zero Trust model Data is an Organization’s most important asset.  Finding the balance between mobility and data security is a challenge in the modern hyperconnected world, especially considering the current reality where there is no more perimeter.  More often, users and data are operating outside traditional IT defenses, placing a new burden on the […]

Privilege Management: allowing access to what is essential

Privilege Management: allowing access to what is essential Privilege Management is a cybersecurity practice that allows companies’ ‘IT departments to control users’ access privileges to information, based on assigned rules (groups, roles, business rules etc.).  It ensures that employees have the necessary access to perform their routine work (the applications and controls required for the function), ensuring the […]

Your Passwords are Not Secure

Your Passwords are Not Secure You have secrets. We all do. Yesterday, your accounts were protected by a seven-digit password. Today, they are unlocked and might be used to hurt you. Your credit card number, your email, your bank account. You think your secrets are safe online, but they are being targeted on a massive […]

Access security is a priority in the cloud

Access security is a priority in the cloud The pandemic has accelerated the migration process of many companies to the cloud. In search of mobility and maintaining business continuity, many systems and applications have been moved to this environment. With the lack of preparedness for most companies in the migration process, two problems occurred:  the […]

Identity protection for more resilient businesses and secure access

Identity protection for more resilient businesses and secure access The pandemic has accelerated digital transformation and the need for organizations to adapt to rapid technological, organizational and social changes.  The scenario favored an increase in concern with Identity Management (IAM) and Access Privilege Management (PAM).  Mainly due to the adoption of the cloud, business processes needed […]