Securing Remote User Access to Critical Internal Systems
Remote users – both employees and vendors – typically need access to critical systems to manage data, patch or upgrade systems, etc., in order to keep business operations running smoothly. A quick review of known 2019 data breaches shows both a sharp increase in third party breaches and in the amount of records exposed.
Organizations now face a range of unforeseen circumstances resulting in immediate sweeping needs for organizations to provide remote workers with controlled access to critical systems. Executing with manual and/or patchwork processes in place can dramatically increase risk as well as cause operational headaches for end-users and security practitioners alike.
Click here to join CyberArk for a live webinar on Tuesday, April 14 to learn more about how to mitigate the security risks associated with providing remote third party vendors and employees with access to your most critical internal resources.
You might also like
Lessons Learned from the Hafnium Attack
An Aggressive, Orchestrated, Global AttackGovernment officials and the cybersecurity community are still reeling after learning the extent of the Hafnium attack that was widely reported last week. Reports estimate at least 100,000 organizations have been breached worldwide by the China-based threat group that launched the attack and at least four more groups have been identified…
Team iON braves the cold for Mustard Seed Fundraiser
Emerging from one of the worst cold snaps in recent history, the iON Striders Walking Team took to Calgary’s pathways on February 20th and raised $2,800.00 for the Mustard Seed as part of the Coldest Night of the Year fundraiser (CNOY). This annual event raises much-needed funds for charities across Canada serving those experiencing homelessness,…
Response to the Solar Winds Supply Chain Attack
IMPORTANT ADVISORY The following blog post addresses a recently uncovered major cybersecurity attack that was spread through an update to the SolarWinds Orion network monitoring software. This attack has major implications for both iON clients and any organizations using SolarWinds Orion. FireEye refers to the backdoor as SUNBURST. They are tracking the campaign as UNC2452. Microsoft has labeled the attack “Solarigate” in Windows Defender (the latest Windows Defender update detects and blocks this attack). Background SolarWinds is a software…