Work-From-Home Cyber Security Risks: Three Ways to Protect Your Network

prnewswire | August 26, 2020

Responding to the rapid increase in work-from-home cyber security incidents at small and midsized businesses (SMBs), DIGIGUARD is now focusing its Cyber Threat Protection Services on remote workforce IT security. "Managing and monitoring work-from-home (WFH) employees includes cybersecurity risk management. Controlling network access helps protect valuable business and customer data from cybercriminals," said DIGIGUARD's Harvey Yan. At a minimum, Yan urges SMBs do three things: Secure and update network perimeter defenses along with endpoints that access the network such as computers, laptops and mobile phones.

Spotlight

This video was created by three Nelson Mandela Metropolitan University students in the Information Technology field, it is based on information security on social networking sites and aims at helping, guiding and training users of social networking sites on how to protect their information.

Spotlight

This video was created by three Nelson Mandela Metropolitan University students in the Information Technology field, it is based on information security on social networking sites and aims at helping, guiding and training users of social networking sites on how to protect their information.

Related News

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Radware Launches New Cloud Security Center in Taiwan

Radware | August 30, 2022

Radware® , a leading provider of cyber security and application delivery solutions, announced the launch of a new cloud security center in Taiwan. The facility will enable customers in Taiwan to secure their datacenters, networks, web and mobile applications, and their APIs with minimal latency, as well as mitigate compliance processes involved in offshore routing. The new security center will protect customers against denial-of-service attacks, web application attacks, malicious bot traffic, and attacks on APIs. This includes the OWASP Top 10 Web Application Security Risks for 2021, OWASP Top 21 Automated Threats to Web Applications, OWASP API Security Top 10, as well as volumetric distributed denial-of-service (DDoS) and application-level DDoS attacks. According to Radware’s First Half 2022 Global Threat Analysis Report, during the first six months of 2022: The number of malicious DDoS attacks climbed 203% compared to the first six months of 2021. The average number of DDoS events per month, per customer was almost 1.5 times higher in the first half of 2022, compared to 2021 and 2020. The number of malicious web application transactions grew by 38%, compared to the first six months of 2021, surpassing the total number of malicious transactions recorded in 2020. “As the size and speed of cyberattacks continue to rise, the launch of the new cloud security center in Taiwan enables us to deliver faster mitigation response times in the region along with the highest levels of security protection,” said Haim Zelikovsky, vice president of Radware’s cloud security services business. “The center also meets a growing demand for local security that complies with data sovereignty requirements.” The new security center in Taiwan is the latest addition to Radware’s cloud security network. Today, the network includes over 10Tbps of mitigation capacity across more than 50 security centers located around the globe. “Radware continues to make investments in protecting businesses and governments alike from the growing threat of cyberattacks. "Taiwan is located within an influential hub in the Asia-Pacific region. Information security is regarded as a national security issue. Setting up a cloud security center in Taiwan will help improve information security standards and increase regional cyber defenses.” Alan Lee, regional director for Radware in Taiwan and Hong Kong About Radware Radware® is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application, and corporate IT protection, and availability services to enterprises globally. Radware’s solutions empower enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity, and achieve maximum productivity while keeping costs down. For more information, please visit the Radware website.

Read More

SOFTWARE SECURITY

SafeGuard Cyber Delivers Context-Aware Response with Microsoft Azure AD and Okta

SafeGuard Cyber | August 01, 2022

SafeGuard Cyber, the leading provider of security and compliance solutions for email and communication-based threats, today announces automated response and multi-channel user onboarding with Microsoft Azure AD and Okta integrations for its security and risk management platform. These integrations enable automated and workflow-based responses to advanced social engineering threats such as impersonation and account takeover, as well as other threats, business risks, and compliance violations. The integrations extend the SafeGuard Cyber platform's multi-channel detection capabilities, with the ability for security and compliance operation teams to manage and automate responses to threats and risks across all communication channels. "In the current economic climate, organizational leadership needs to ensure optimum resource utilization in security operations and reduce unnecessary costs," said Chris Lehman, CEO of SafeGuard Cyber. "Many of our enterprise customers have made significant investments in Azure AD or Okta to manage identities across their organizations, and our new capabilities allow them to streamline operations and maximize ROI for their security and overall operations." Integrated response through SafeGuard Cyber enables security architects and operations teams to deliver the ideal response to threats and business risks, either in an automated or direct action through the SafeGuard Cyber platform as part of incident management or an investigation. "As the threats of fraud, impersonation, and social engineering increasingly result in material breaches and financial losses through ransomware and business compromise, the need to have a context-aware, zero-trust foundation with detection and response capabilities is more urgent than ever. "Our integrations with Okta and Azure AD enable organizations moving towards a cloud or hybrid workplace to simplify identity-based responses to communication-based threats, while enriching authentication to include context and intent of interactions." Rusty Carter, chief product officer at SafeGuard Cyber Context-aware and advanced integrated response with Okta and Azure AD is available for all SafeGuard Cyber customers and delivers: Automated user onboarding for monitoring communications by group Automatic, risk-based responses that include user-session invalidation Support for all SafeGuard Cyber protected channels SafeGuard Cyber detects attacks and identifies risk by understanding how humans interact and communicate. The company's Natural Language Understanding-based SaaS platform offers the industry's most advanced visibility and detection of phishing, BEC and malware attacks that span the full range of modern business communications channels, including social media, collaboration, mobile messaging, conferencing, CRM and the Microsoft 365 ecosystem. About SafeGuard Cyber SafeGuard Cyber provides the only comprehensive technology solution for addressing cybersecurity threats and compliance risks across the modern cloud workplace. The company's patented and award-winning Natural Language Understanding technology analyzes and correlates conversations across 30 communication channels and 52 languages, including collaboration, social, chat, messaging, and conference platforms, in order to detect and prevent communication-based threats like social engineering. By stopping attacks at the social engineering stage, SafeGuard Cyber allows companies to prevent data breaches, ransomware, invoice fraud, and many other threats. The company's cloud-based Machine Learning also provides compliance solutions for governance and policy enforcement that empower customers to communicate through modern apps and social networking.

Read More

DATA SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

BeyondTrust Introduces New Intelligent Identity and Access Security Platform

BeyondTrust | August 23, 2022

BeyondTrust, the leader in intelligent identity and access security, today announced the BeyondTrust Platform, featuring a modern architecture that delivers unprecedented visibility of identities and access across an organization’s entire digital estate, from on-premises to cloud, hybrid and operational technology environments. The BeyondTrust Platform delivers the most powerful intelligent identity and access security through an elegant, unified platform and interface that removes friction and drives unparalleled insights for organizations of all sizes. Today, organizations are being asked to do more with less, while facing an expanding threat landscape. They know they cannot solve emerging security problems with a disjointed patchwork of solutions or a poorly integrated ecosystem. “Our customers have told us they want a single platform that removes complexity and the risk created by fragmented infrastructure,” said Raj Cherukuri, Chief Product Officer at BeyondTrust. “They need solutions that accelerate time to value with easy deployments and deliver a robust set of common capabilities to reduce security risk, while accelerating their digital transformation initiatives.” The BeyondTrust Platform leverages a single interface to discover, manage, and protect identities, control access, as well as proactively detect anomalous activity. This new solution reduces complexity and management burden through a revolutionary single agent approach and unified management console across all BeyondTrust apps. Along with the platform, BeyondTrust also announced: BeyondTrust’s new Endpoint Security App, a modern privilege management solution that enables better policy management, access control, aggregated application monitoring, and threat detection; these integrated capabilities prevent attackers from elevating privileges, mitigating cyberattacks. The initial release of BeyondTrust’s new Cloud Privilege Manager App, which provides visibility and management of entitlements across multicloud environments from a single pane of glass. Together, with the Endpoint Security App, it enables broad visibility of identities across an organization’s on-premises and cloud footprint. By adopting a natively integrated and unified solution for identity and access security, organizations can better tackle existing use cases and expand to emerging ones, further reducing their attack surface. The BeyondTrust Platform provides a unified view of an organization’s identity landscape. This visibility helps organizations: Better manage, control, and protect their identity landscape More effectively control access to critical resources Easily meet security and compliance targets Key features and benefits include: Breakthrough User Experience – Unprecedented ease of use by leveraging natively integrated common capabilities, which can be activated as needed with a new trial and self-service approach Unified Management – A single console and unified dashboard deliver navigation, management, and reporting across all apps A Universal Agent – Streamlined deployment and straightforward maintenance with automatic installs and upgrades with no reboot required Asset Discovery – Gain unified cross domain visibility with scanning across the entire environment Unified Policy Management - Proactively manage drift with a policy advisor, a common policy framework, out-of-the-box policy templates and version control Centralized Reporting - Leverage information holistically across apps to support better decision-making, with easy customization options Holistic Visibility – Gain insight into privileges in use across the entire IT environment – on-premises, cloud, hybrid Identity Security Insights – Use identity-centric and cross app analytics for better decision making and prevent problems before they happen Health Monitoring – Keep track of the health and status of your endpoints and assets with proactive analytics Multitenant Deployment – Create multiple tenants within a deployment with complete isolation to match the organization’s structure About BeyondTrust BeyondTrust is the worldwide leader in intelligent identity and access security, empowering organizations to protect identities, stop threats, and deliver dynamic access to empower and secure a work-from-anywhere world. Our integrated products and platform offer the industry's most advanced privileged access management (PAM) solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments.

Read More