The novel coronavirus has forced millions of people to work from home, triggering cybersecurity challenges for companies worldwide. It is now imperative for organizations to support and protect their work-from-home employees for a prolonged period. There are various ways a firm can protect their employee, and one of them is reviewing your virtual private network (VPN). Companies can secure … [Read more...] about Tips to optimize your VPN security
Cyber security tips
Cybercrime during COVID-19: 5 things every CISO needs to know
Due to COVID-19, most countries worldwide are facing economic recessions and a rise in online fraud attempts. The recession due to COVID-19 may drive up cybercrime by 35%, according to one estimate. It is worth noting that during the 2008 recession, countries like Brazil and Spain suffered economic downturns that led to a rise in cybercrimes. It is difficult to predict the increase in … [Read more...] about Cybercrime during COVID-19: 5 things every CISO needs to know
5 steps to avoid credential dumping attacks
Credential dumping is a technique used by cybercriminals to gain access to a network. They enter the workstation through phishing and controls through the typical way the admin uses and monitors the network to find exposed credentials. The cybercriminals find out organization vulnerabilities which lead them to credential dumping. Given are few ways to identify the vulnerabilities to avoid … [Read more...] about 5 steps to avoid credential dumping attacks
Two-factor authentication explained
What is two-factor authentication? Two-factor authentication is a method of providing access to an online account. It requires two different types of information to get access to information or system. It is a way of convincing the computer system that you are the one who has the right to access to the system or information. The common authentication method used is the username and … [Read more...] about Two-factor authentication explained
Why you need both authorization and authentication
Authorization is a small portion of the access control equation, organizations the authentication steps to effectively manage access to sensitive data. Authentication is the process of validating the identity of authorized users trying to get access to an application, API, microservices and other data. Authorization is permitting an authenticated user the permission to perform a given action on … [Read more...] about Why you need both authorization and authentication