As companies begin to strategize how their employee office structure will look over the next several months – be it phasing in a portion of the workforce into the office or considering a fully remote workforce - top of mind will be the organization’s security posture and that IT teams can support the needs of employees and the business in a capacity that ensures a smooth, secure transition.
Organizations and their employees have always faced cyber vulnerabilities. However, with remote working, companies need to address the many layers of cybersecurity risks. The recent number of 'zoom bombing' incidents is a perfect example showing that the use of remote technologies at scale is causing new headaches and challenges for IT.
A new VIAVI study revealed that 73 percent of respondents said security professionals need comprehensive visibility into network infrastructure to enhance cybersecurity efforts and speed remediation.
The current COVID-19 pandemic is changing the business landscape. The most immediate being the sudden increase in the amount of people working from home. It is no surprise that this change has significantly increased the attack surface, forcing companies to strengthen their cybersecurity measures to ensure they do not become the next victim of cybercriminals.
In a ground-breaking opinion issued today, the Court of Justice of the European Union invalidated the EU-US Privacy Shield Decision as a method for transferring personal data from the EU to the US. In short, the Decision was invalidated over Privacy Shield’s failure to adequately address US government surveillance activities.
What are some steps Security Operations Center (SOC) teams and security professionals can take to improve the performance of their Intrusion Detection Systems (IDS) tools, and lower the noise?
Beyond the essential functions of security monitoring and recording, IP video surveillance offers myriad video analytic behaviors that can help retail businesses during the ongoing coronavirus pandemic.
Evacuations and lockdowns are two events no organization wants to face, but every organization should be prepared for. They often happen in response to particularly dangerous situations that pose an immediate threat to people and property. It can be difficult to know how and when to make the decision to lockdown or evacuate, and it can be even more difficult to manage once the decision has been made. In either case, it requires organizations plan, test and have the right tools in place to reach all of their people quickly with information on what actions they should take to stay safe.
With a myriad of employees and contractors given ubiquitous access to business data, one thing is clear; identity has become the new security perimeter. Ensuring ERP data security, privacy, and compliance can no longer rely solely on network threat monitoring but requires using a layered identity defense to limit access to and within mission-critical applications.