Search Results for: working remotely Blog Post Workstation Hardening In a Remote Environment August 4, 2020 Whether you’re sick and can’t make it to work that day or there’s a pandemic affecting the world, working remotely... Blog Post Is Your Remote Work Infrastructure Secure? February 10, 2021 The pandemic situation has driven radical change in businesses. It has compelled enterprises to adapt to new working models rapidly.... Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are... Blog Post 7 Cybersecurity Lessons We Learned From the COVID-19 Outbreak April 1, 2020 The outbreak of COVID-19 is changing the current situation of the economy, creating confusion for industries such as retail, tourism,... Blog Post A New Approach Dealing with Insider Threat November 7, 2019 Perimeter-based security has become less meaningful over time since working remotely has become more common and popular. Therefore, when we... Blog Post Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic... Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... Blog Post Rethink the Future of Work Through the Outbreak of COVID-19 March 16, 2020 The outbreak of COVID-19 at the beginning of 2020 is not only a challenge to the level of social governance... Blog Post Over 500,000 Telnet Credentials are Exposed January 22, 2020 Telnet is a communication service protocol that helps a user in controlling a remotely connected device over the TCP/IP... Blog Post New Ransomware hitting Industrial Control Systems like a nuclear bomb February 10, 2020 Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or... Blog Post Citrix Allowed Hackers to Linger For 5 Months! February 22, 2020 Citrix just reported that for five months, between 2018 and 2019, hackers were inside its network systems and stealing financial... Blog Post Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Blog Post Workstation Hardening In a Remote Environment August 4, 2020 Whether you’re sick and can’t make it to work that day or there’s a pandemic affecting the world, working remotely...
Blog Post Is Your Remote Work Infrastructure Secure? February 10, 2021 The pandemic situation has driven radical change in businesses. It has compelled enterprises to adapt to new working models rapidly....
Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
Blog Post Iranian Script Kiddies Spread Dharma Ransomware via RDP Ports September 28, 2020 A group of script kiddies tied to Iran have been linked to the recent Dharma campaign. These “newbie” hackers are...
Blog Post 7 Cybersecurity Lessons We Learned From the COVID-19 Outbreak April 1, 2020 The outbreak of COVID-19 is changing the current situation of the economy, creating confusion for industries such as retail, tourism,...
Blog Post A New Approach Dealing with Insider Threat November 7, 2019 Perimeter-based security has become less meaningful over time since working remotely has become more common and popular. Therefore, when we...
Blog Post Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed July 19, 2021 Fight Staff Burnout: Cybersecurity Teams Overworked, Understaffed – Those working in the cybersecurity field have made it through this pandemic...
Blog Post Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
Blog Post Rethink the Future of Work Through the Outbreak of COVID-19 March 16, 2020 The outbreak of COVID-19 at the beginning of 2020 is not only a challenge to the level of social governance...
Blog Post Over 500,000 Telnet Credentials are Exposed January 22, 2020 Telnet is a communication service protocol that helps a user in controlling a remotely connected device over the TCP/IP...
Blog Post New Ransomware hitting Industrial Control Systems like a nuclear bomb February 10, 2020 Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or...
Blog Post Citrix Allowed Hackers to Linger For 5 Months! February 22, 2020 Citrix just reported that for five months, between 2018 and 2019, hackers were inside its network systems and stealing financial...
Blog Post Internal v. External Security Personnel September 23, 2020 Over the years, cyberattacks have grown in sophistication and diversity. The threat landscape is continuously evolving, and there does not...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...