Desktop Support and Data Breaches: The Unknown Dangers

"According to the 2014 HDI Desktop Support Practices & Salary Report, remote control tops the “must have” list of technologies to successfully provide desktop support to end users. Unfortunately, many service desks are using legacy remote access tools that often leave security gaps putting companies at higher risk of data breaches. This is not a new or unknown issue. Often, IT departments don’t realize the tools they’re using to provide tech support are also being compromised by hackers to plant malware and steal data.  According to the 2013 Trustwave Global Security Report, legacy remote access tools such as RDP and VNC are cited year after year as the most common attack pathways used by hackers. So if remote control tools top the must-have list, what can service desks do to securely support their users without putting their organizations at risk?"
Watch Now

Spotlight

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard. It is
intended to reduce credit card fraud by ensuring that organizations that are handling branded credit cards protect user data from exposure. The standard has undergone several


OTHER ON-DEMAND WEBINARS

Data Is the Heart of Your Organization. Keep It Safe in the Cloud

"The state of business continuity and disaster recovery planning is dismal in most organizations and nonexistent in many. Most plans in place simply don't work. This is not surprising since disaster recovery hasn't been a priority among CIOs, until now, as cloud for disaster recovery is now a viable and more cost-effective option for organizations. One of the key activities of business continuity (BC) management is measuring the performance of the program. Good governance presumes analysis of ongoing business processes to ensure they are fulfilling company objectives. In most business continuity management activities, a management review and assessment process should be performed, and the use of metrics for measuring BC performance will provide tangible and auditable evidence that your program is performing up to expectations. Join us and learn how to prepare for security threats such as Heartbleed by developing a metric-driven BCM program that can be implemented in the cloud, and learn how to present your plan from a business perspective that your managers will understand and support. "

BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.

Benchmarks for Corporate Cybersecurity

SIA

This webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA) will present the findings of The Cybersecurity Imperative research project produced by WSJ Pro Cybersecurity and ESI ThoughtLab and sponsored by SIA. We will share insights into how 1,000-plus organizations around the globe measure their cybersecurity preparedness and how they are preparing for future cyber threats.

Making the business case for proactive cyber security

Foresite

Organizations of all sizes are faced with ever-increasing cyber threats and changing regulations, yet how do you make the business case to justify a proactive approach? In this webinar, we will cover: The drivers for a managed security approach. Review of options for managing cyber security How do you evaluate which solution is the best fit for you? Making the business case – how to calculate your approximate risk costs to determine appropriate level of budget.