While I thought the conversation started 10 years ago, as early as 2004 we’ve been talking about the de-perimeterization of our cybersecurity thinking. Regardless of when the conversation started, there are clear recommendations to move cybersecurity strategies away from the concept of a defined security perimeter, often designated by the corporate network, with everything outside the network...Continue Reading →
Even though companies worldwide are struggling to protect systems and data from incessant waves of cyberattacks—there seems to be no end in sight. With the release of the FBI’s Internet Crime Report 2020, it is apparent that cybercriminals took advantage of the impact of the pandemic while many of us were distracted with trying to figure out our “new normal” and the technology we require to...Continue Reading →
Due to the novel coronavirus pandemic throughout 2020, many businesses were required to have their employees work from home, and even with the vaccine rollout and a small beam of normalcy, many will continue to work remotely. In a recent Gartner CFO survey 74% of CFOs report that they plan to shift some employees to permanently work remotely.Continue Reading →
A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your IP (Internet Protocol) address and establish a secure and encrypted connection to provide greater privacy than even a secure Wi-Fi spot.
More importantly, as more users are working from home and expected to continue to work from home, VPNs...Continue Reading →
Tags: Authentication Security, IT Security, NAS, PortalGuard, remote access, OTP, Password Security, RADIUS, Remote Authentication, Single-Factor Authentication, Two-Factor Authentication, Virtual Private Network, VPN
Like the blog? Read the whitepaper!
Most portals are designed for their function and only provide the basics when it comes to security, but with the increase in cyberattacks, this is no longer enough.Continue Reading →