by siteadmin | Oct 27, 2020 | Network Security, User Security
Over the past few years, VPN vulnerabilities have been in the spotlight and talked about everywhere. There is always some vulnerability being abused by opportunists and criminals, but VPNs still remain the majority solution of choice for remote access across the...
by siteadmin | Oct 27, 2020 | Mobile Security
How many apps do you currently have on your mobile device? Is this number a total across both your personal and professional devices? Did you know that between Android’s Google Play Store and Apple’s App Store, there are between 2.2 and 2.8 million apps available to...
by siteadmin | Oct 27, 2020 | Network Security
As the spread of COVID-19 is forcing employees to work remotely, it’s put an unprecedented strain on organizations’ network and security teams, a direct result of the sudden rise in new access requests from remote employees. For many IT departments, this means having...
by siteadmin | Oct 27, 2020 | Data Security, Network Security, User Security
A zero trust architecture enables organizations to prioritize access and restrictions. The goal is to implement a zero trust policy across all traffic, to ensure no user, device, or system can put the network at risk. Zero trust architectures typically enforce three...
by siteadmin | Oct 27, 2020 | Network Security
First Thing’s First As we’ve written about previously, the standard authentication protocol used on encrypted networks is Extensible Authentication Protocol (EAP), which provides a secure method to send identifying information for network authentication. 802.1x is the...
Recent Comments