Desktop Support and Data Breaches: The Unknown Dangers

"According to the 2014 HDI Desktop Support Practices & Salary Report, remote control tops the “must have” list of technologies to successfully provide desktop support to end users. Unfortunately, many service desks are using legacy remote access tools that often leave security gaps putting companies at higher risk of data breaches. This is not a new or unknown issue. Often, IT departments don’t realize the tools they’re using to provide tech support are also being compromised by hackers to plant malware and steal data.  According to the 2013 Trustwave Global Security Report, legacy remote access tools such as RDP and VNC are cited year after year as the most common attack pathways used by hackers. So if remote control tools top the must-have list, what can service desks do to securely support their users without putting their organizations at risk?"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Double Your Revenue with Backup and DRaaS

Unitrends MSP

The information age is upon us and your clients are grappling with how to effectively deal with the data explosion. They need help in efficiently backing up critical data and ensuring they can quickly recover from disasters whether they be natural or inflicted by humans. Elite IT Solution and Managed Service Providers are selling industrial strength back-up and DRaaS solutions that are addressing the situation, mitigating the risk and complexity of ensuring error-free backups that can be restored quickly in the event of a disaster.
Watch Now

No Host Found: Remote Connection Security in a Post-VPN World

Internet connectivity has become a must-have feature for digital business operations. Devices on the edge provide significant value, but the constant connectivity comes with a price in terms of security risk. Hackers may target industrial controls, healthcare devices, sensors, or vehicles through their open ports and global IP a
Watch Now

How to Leverage Hacking Competitions as an Educational and Recruitment Tool

HealthcareInfoSecurity

One of the most-heard complaints from security experts is that often they find their work repetitive ("The CFO's laptop has been compromised... again!"), which results in the desire of trying something "new", meaning "leave for another company." Another common complaint is that the work is very compartmentalized, and there are few occasions in which the various security specialists can enjoy working as a team. One activity that can help build a team while improving the security skills of the people involved is participating in Capture the Flag (CTF) hacking competitions. In 2003 at the University of California at Santa Barbara, one of the world's largest attack-defense CTF competitions began and has grown year-after-year, pushing the limits of the players and providing opportunities for better learning. In addition, hacking competitions are a great opportunity for recruiting new talent: CTF participants are highly skilled, well-motivated, and hard-working, which are great traits for a future employee.
Watch Now

API Security Through the Lens of Modern DevSecOps

Application Programming Interfaces (APIs) have evolved into business-critical services with a unique set of application security needs. The evolution of the Business Logic Layer was accelerated in part by the popularity of the Postman API Platforms; however, traditional security testing products have struggled to adapt. This next generation of business logic API collections require a fundamentally new technology and native testing experience that empowers organizations to overcome modern security challenges.
Watch Now