Home Search

remote work - search results

If you're not happy with the results, please do another search
Employees

Fear Fatigue Exploits Cybersecurity of Remote Employees

0
The increasing hybrid workforce due to the global pandemic has severely impacted cybersecurity, bringing swift changes in the work environment. The latest report from...
4 in 10 Companies Expose Unsafe Network Services Online, network and security

Three Steps to Bridge the Network and Security Divide

0
Until recently, network and security teams could go about their business completely effectively with little requirement for anything more than a light-touch partnership. If...
network security, BlackMatter ransomware, privilege

Explore 4 Key Elements of Network Security

0
Network security and threats are of primary concern during the ongoing pandemic and are increasingly becoming sophisticated and complex. No home or corporate network...
network and ransomware attacks in Singapore, Singapore Ranks Most Prepared in Cybersecurity Readiness: Deloitte

Singapore Businesses Struggling to Cope with Network and Ransomware Attacks

0
While Singapore is accelerating its digital transformation capabilities, cybersecurity standards remain a severe concern for organizations in the country. New research from Barracuda Networks...
Microsoft September 2021 Patch Tuesday

Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds

0
Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...
Remote Security Policy, Remote Work Jeopardizes Corporate Network Security: Report

Overcoming the Challenges of Executing a Remote Security Policy

0
Gartner estimates that around 30% of workers in India will be remote in 2022. While the penetration might be low compared to the U.S.,...
Network protocols, FIN7 hackers

What Are Network Protocols and How Are They Used?

0
Network protocols are a set of pre-defined rules and guidelines that computer-related devices follow to enable network communication. These standard rules framework in the...
Microsoft, Cyberattack on Olympus

Top 10 Common Types of Network Security Attacks Explained

0
The risk of network security attacks is mounting as businesses transition to a remote work environment and embrace sophisticated technology. The IT (Information Technology) and...
Network Security Threats, SSID Stripping

How Can You Identify Network Security Threats and Vulnerabilities?

0
Network security threats have become a much bigger issue today. With the expansion of Internet services and the increasing remote work culture, network vulnerabilities...
Network Security

Network Security for Legal Eagles

0
Today, no industry sector is safe from cyberattacks, as threat actors target businesses with a malicious aim of gaining information or monetary benefits. The...