Securing Remote User Access to Critical Internal Systems
Remote users – both employees and vendors – typically need access to critical systems to manage data, patch or upgrade systems, etc., in order to keep business operations running smoothly. A quick review of known 2019 data breaches shows both a sharp increase in third party breaches and in the amount of records exposed.
Organizations now face a range of unforeseen circumstances resulting in immediate sweeping needs for organizations to provide remote workers with controlled access to critical systems. Executing with manual and/or patchwork processes in place can dramatically increase risk as well as cause operational headaches for end-users and security practitioners alike.
Click here to join CyberArk for a live webinar on Tuesday, April 14 to learn more about how to mitigate the security risks associated with providing remote third party vendors and employees with access to your most critical internal resources.
You might also like
iON at the Western Canada Information Security Conference
The Western Canada Information Security Conference is back on May 16-17! This year’s event will once more bring together IT Security and Audit professionals plus OEM and local vendors for two days of top-notch presentations and excellent networking opportunities. The top names in cybersecurity will be well represented at this year’s event, so if you’re…
Password Policy Best Practices
World Password Day is Thursday, May 5, which is a good reminder that strong password policies are crucially important to a sound cybersecurity practice. Password guessing based on publicly available information is one of the most common tactics of malicious actors. Weak passwords also remain a top cause of data breaches for organizations of all…
ICS Malware: Industroyer2 and Pipedream
Last week, two new ICS malware tools were unveiled to the world that have the potential to wreak havoc on North American industrial control systems.Industroyer2Industroyer2 was a major component of a recent, unsuccessful attack on high-voltage electrical substations in Ukraine. This attack was linked to Sandworm, a threat group affiliated with Russia’s GRU military intelligence…