World Internet Day – 5 tips to improve your network security

World Internet Day: 5 tips to improve your network security World Internet Day was created on May 17, 2005, in Tunisia. WSIS (World Summit on the Information Society) made a proposal to the UN to create this commemorative date, with the objective of increasing digital inclusion and connecting, through the internet, developed and underdeveloped countries, ensuring global access […]

9 benefits of secure remote access without VPN

9 benefits of secure remote access without VPN The pandemic has caused many companies to change their way of working almost overnight, in order for their employees to continue their work routine at home. To build out an infrastructure that supports remote work, many organizations have chosen to use a VPN (virtual private network), which […]

Security risk factors for remote work without planning

Security risk factors for remote work without planning According to a US survey, it is estimated that more than 300 million people worldwide are working from home due to the COVID-19 pandemic.    A 2017 study points out that remote work increases productivity by 13%. It saves time, reduces absences, increases life quality, and so on. There are many benefits and, like any other technological solution, some risks.     From February 1st through the first half of March, more than 300 websites with malicious domains using the term ”COVID-19″ in their URL were served up; some of these were used to spread malware and scams. The subject matter ranged from advertisements promising medicines against COVID-19 to news, and lll the websites, reportedly coming from legitimate organizations, such as the World Health Organization.    The high flow of data along with the changing behavior of companies on a large scale can cause unwanted Cybersecurity risks for Organizations if the adoption of remote work security is not implemented.    What if your company was not prepared, what should you do? VaultOne has put together some pointers to help you prepare a more secure home-office experience. Points that should be covered in the security planning stage 1. Assess whether the IT structure for remote work ensures that employees have adequate devices and that access to corporate information is secure.    2. Protect employee applications and devices: secure access to systems, adopt encryption, firewalls, and have response mechanisms in case of an attack.    3. Have a Business Continuity and Crisis Management Plan that includes cybersecurity, convering contingency situations, reaction to unexpected events, […]

Password Security: longer or more complex ?

Password Security: longer or more complex? When entire businesses are operated solely online, passwords become a critical piece of cybersecurity.  So, when creating a password, what is more secure – length or complexity?  Passwords are insecure by nature, so your company needs to be savvy about creating them. They need to look beyond the basics because simple passwords are too easy for hackers to figure out.   Your staff […]

5 ways to improve the strength of your Password

5 ways to improve the strength of your Password Passwords are insecure by nature, and soon will come a day where they will be phased out for a more secure way to protect your business, but until that day, your company needs to be savvy about protecting its digital identity online.  Intellectual property is no longer safely tucked away in-house but is floating […]

8 actions to improve the protection of sensitive data

8 actions to improve the protection of sensitive data Did you know that most data breaches do not occur due to highly advanced hacking skills, as portrayed in the movies?  There is a remote chance that this could happen; however, most of the time, data breaches occur due to leaked privileged credentials that can occur in several ways: phishing, carelessness […]