Businesses that can safely stay open with remote workforces have largely transitioned to work-from-home scenarios because of the COVID-19 crisis, and in part one of our blog we focused on these system enhancements to support remote work: Cloud Collaboration Access and Monitoring Virtual Desktop Infrastructure (VDI) Bandwidth/Firewall Upgrades to Enable Virtual Private Networks (VPN) But […]
Now that businesses have largely transitioned to working remotely, we can all sit back, relax, and enjoy worry-free, comprehensive communication…right? Wrong! Other system enhancements are needed that can make – or if ignored – potentially break your network while working from home.
Remote work policies have become a necessity not just because of the current state of affairs, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats.
Securing enterprise data and business applications is undoubtedly at the forefront of every IT professional’s mind. However, efforts to secure data and applications competes with the priority to open up resources for a distributed workforce by moving applications and data to multiple cloud and SaaS platforms.
The firewall remains the front line of cyber-defense for most organizations. The firewall protects an organization’s network, and that function isn’t going away anytime soon. Remember when people used to say, “the firewall is dead”? The numbers tell a different story.
From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save money on these devices by capitalizing on less expensive secondhand products sold by third-parties like eBay, Craigslist and even friends or family.
Pre-Virtual Virtual Firewalls Nowadays, everyone likes to talk about network function virtualization. Most security vendors build their firewall products to run on a few popular hypervisors. However, the “virtual firewall” term predates this virtualization craze.
Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS software as well as the various software that support Windows OS. Exploits as well as exploit mitigation techniques have evolved over the years.
On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle information relating to their customers, giving greater protection to individuals and harmonizing the laws for data-handling across the EU. So, if this is an EU law then, […]