Remove CISO Remove Passwords Remove VPN
article thumbnail

Enabling Secure Remote Working in Times of Crisis: Plan Ahead

Thales Cloud Protection & Licensing

VPN access to the network, when most apps are still delivered on-premises. Unfortunately, businesses still rely on simple usernames and passwords, making phishing campaigns serious security issues. Remote desktop or virtual environments.

VPN 131
article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

Remote desktop software’s sensitive influence over other devices means identity and access management (IAM), password security , and multi-factor authentication are critical for risk management. On a Sunday in February 2018, the Colorado CISO’s office set up a temporary server to test a new cloud-based business process.

VPN 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA Conference 2021: Resilience

Duo's Security Blog

In this talk, Brad will discuss how Cisco’s Zero Trust rollout was not only a logistical challenge with 100,000 global users and a complex mix of cloud and on-premises applications, but also a huge shift in how the company itself thought about networks, perimeters, and security (including reducing its own VPN usage).

CISO 97
article thumbnail

The four cybersecurity trends to watch in 2023

CyberSecurity Insiders

By: Matt Lindley, COO and CISO of NINJIO. When employees aren’t in the office, they’re liable to engage in risky behaviors such as using unsecured WiFi without a VPN, leaving work devices unlocked in public places, and clicking on malicious emails. Companies should also provide clear channels for reporting suspicious incidents.

article thumbnail

Return to base: the ultimate guide to preparing a COVID-19 exit strategy

IT Security Guru

In this article, we discuss the preparation CISOs should consider making to offset a number of security implications that arise from returning your workforce from home and back to the office. Password Reset: It is possible that employees have shared their laptops and credentials with their family or friends. Conclusion.

Software 115
article thumbnail

Snowflake Data Breach Rocks Ticketmaster, Live Nation, and Others

SecureWorld News

"We have no indication that payment card data or passwords were compromised." Brad Jones, CISO at Snowflake, issued a Joint Statement regarding Preliminary Findings in Snowflake Cybersecurity Investigation on its Snowflake Forums. In this case, it appears that the security of cloud-hosted data is only as strong as the users' passwords.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

.” – Richard Hall, Senior Director IT Infrastructure and Operations, Financial Force Phase 3: Enabling access to apps Enable access to applications with VPN-less access (e.g., ZTNA) – regardless of location or protocol. For more information, check out our on-demand webinar Your Zero Trust Roadmap.