Introduction Remote working has many employees not only working from home but really from anywhere. Services necessary to work remotely such as VPN, cloud-based applications and internet access vary along with the reliability of those services. Inconsistent service availability means employees work both online and offline. As attacks against remote systems continue to surface, … [Read more...] about Offline Protection for Remote Systems
remote
Major Instagram App Bug Could’ve Given Hackers Remote Access to Your Phone
Ever wonder how hackers can hack your smartphone remotely? In a report shared with The Hacker News today, Check Point researchers disclosed details about a critical vulnerability in Instagram's Android app that could have allowed remote attackers to take control over a targeted device just by sending victims a specially crafted image. What's more worrisome is that the flaw not … [Read more...] about Major Instagram App Bug Could’ve Given Hackers Remote Access to Your Phone
Cisco Secure Remote Worker Architecture for Azure
Today companies are investing in empowering their workforce to have a secure connection to the resources hosted in the Cloud. Cisco provides a secure remote worker solution that uses the Cisco AnyConnect Secure Mobility Client, Cisco Duo, Cisco Umbrella, and Cisco Advanced Malware Protection (AMP) for Endpoints. Cisco AnyConnect Secure Mobility Client: Cisco AnyConnect Secure … [Read more...] about Cisco Secure Remote Worker Architecture for Azure
Crossing the Chasm of Remote Access Doesn’t Have to Be Scary
And just like that, everything changed On March 9, 2020, like so many other workers around the globe, I was told to stay home. There was a sudden, collective agreement: going into our place of business was no longer an option. And I was grateful. I was grateful that my company had the technology in place to ensure that I could not only keep working, but we could all thrive … [Read more...] about Crossing the Chasm of Remote Access Doesn’t Have to Be Scary
Tame the wilderness of remote access and answer the call of the mobility
Summer is just about over. You may have missed it as we kept our distance and curbed many of our travel plans. As the reality of a continued work from home, school from home, and stay at home hit our home; we hit the road to capture a bit of summer, heading into the Pacific North West. While watching the clouds roll above the remote beaches along the Oregon coast, I wondered if … [Read more...] about Tame the wilderness of remote access and answer the call of the mobility
Securing Remote Work: Questions You Should Ask
No one could have anticipated the overnight need to rapidly pivot from working in an office to working remotely. Today, 76% of employees are working from home, needing remote access to corporate systems from all sorts of devices from unknown, potentially unsecure home networks. But with 68% of breaches originating on endpoints and bad actors intensifying pandemic-themed malware … [Read more...] about Securing Remote Work: Questions You Should Ask
Flaws in Samsung Phones Exposed Android Users to Remote Attacks
New research disclosed a string of severe security vulnerabilities in the 'Find My Mobile'—an Android app that comes pre-installed on most Samsung smartphones—that could have allowed remote attackers to track victims' real-time location, monitor phone calls, and messages, and even delete data stored on the phone.Portugal-based cybersecurity services provider Char49 revealed its … [Read more...] about Flaws in Samsung Phones Exposed Android Users to Remote Attacks
New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks
Security researchers have outlined a new technique that renders a remote timing-based side-channel attack more effective regardless of the network congestion between the adversary and the target server.Remote timing attacks that work over a network connection are predominantly affected by variations in network transmission time (or jitter), which, in turn, depends on the load … [Read more...] about New Attack Leverages HTTP/2 for Effective Remote Timing Side-Channel Leaks
Actionable Indicators to Protect a Remote Workforce
Introduction As the world continues to adjust to the new reality of employees working from anywhere and at any time, security teams are working overtime to protect users from cybercriminals that use novel themes and lures to mount attacks. Organizations are faced with a dilemma: Security teams are expected to be aware of the latest global techniques and campaigns, but with … [Read more...] about Actionable Indicators to Protect a Remote Workforce
Securing Remote Work: Protecting Endpoints the Right Way
The remote work environment has been around for years. In fact, 56% of employees in the US have a job where some of what they do could be done remotely even before the pandemic. However, no one could have predicted the sudden need to fast-track remote worker access to corporate systems. Overnight, we’ve gone from environments where most of us were confined to an office … [Read more...] about Securing Remote Work: Protecting Endpoints the Right Way