IT - Security

While organizations continue to invest significant budget dollars in security controls and assume that this means assets are fully protected, the reality is that a majority of attacks successfully infiltrate production environments without their knowledge, according to a FireEye report.

"Additionally, the report includes guidance to help organizations ensure that their security controls perform as expected by implementing a strategy that includes continuous security validation.

'Every organization wants reliable data that tells them if their security investments are delivering real value and protecting them from becoming the next major cyber-attack headline,' said Chris Key, Senior Vice President at Mandiant Security Validation..."


The COVID-19 Pandemic is changing everything about the way we work. Securing your networks now will pay dividends long into the future, because cyber criminals aren't going away

"Amidst talk of global lockdowns and economic crashes, though, one of the major impacts of the virus has gone slightly overlooked. With millions of workers in the US and worldwide now being forced to work from home, they are more exposed than ever to network security risks.

Many companies have struggled to make remote working more secure for years. During the current crisis, many have been forced to immediately transition to decentralized networks and working practices. The security challenges of decentralized organizations are no longer a niche subject, and new threats are also emerging as a direct consequence of Coronavirus.

In this article, we'll look at the three main ways in which remote working increases the level of cyberthreat faced by your workers and your company. We'll then show you how to mitigate them..."


COVID-19 has forced companies to determine the best way to keep remote employees supported. Not sure which way to proceed? Consider these remote access best practices

"The COVID-19 pandemic has compelled many employees to work from home, forcing companies to deploy new software and procedures designed to permit remote access to corporate data and applications. IT service desk staff have also seen their roles change. For these employees, it's not just connecting to data and apps. They must also access end users' devices to deliver troubleshooting and support services.

That's where remote access comes in. In most cases, remote access software is used to capture the at-home user's desktop, where it is then transported across the internet and mirrored on the IT support staffer's desktop. The software lets IT support staff take control of keyboard and mouse inputs to configure or troubleshoot both the remote OS and any applications or data residing on the end user's device..."


Cyber criminals are enjoying a boom during the Covid-19 pandemic, and security teams are working overtime as a result. How can security pros manage their increased workload, safeguard their mental wellbeing, and avoid burnout?

"As Covid-19 sweeps across the globe, it forced many organisations to undergo an immediate digital transformation, whether they were ready for it or not. A paradigm shift to nearly 100% teleworking has changed many aspects of how people work, collaborate, access data and even rethink what work-life balance really means.

While some organisations may be better prepared than others, the cyber security challenges and risks still matter greatly to all organisations. Cyber security operations teams had to quickly pivot to stay ahead of the rapidly evolving Covid-19 related threats to protect organisational data effectively. These changes, coupled with existing cyber expectations and challenges, can dramatically increase the workload for cyber security professionals..."


The fact that over 80% of employees have shifted to remote network access due to COVID-19 is not lost on cyber adversaries who eye this period of rapid transformation as an opportunity to exploit an expanded attack surface

"They know IT and cyber security teams had little to no time to prepare for the dangers this crisis presented and will not hesitate to act if organizations fail to remain vigilant.

Times like these require a renewed commitment to the fundamentals of cybersecurity. It's not just about having the right tools, but also the right knowledge and experience to protect your organization and employees from new tactics and entry points.

With that in mind, our team has assembled 8 Key Security Threats and Insights to consider with today's expanded remote workforce..."

See all Archived IT - Security articles See all articles from this issue