fragile state of VPN
Different layers of VPN vulnerabilities Despite the seemingly solid reputation, VPNs are not impenetrable – and never have been. Corporate or not, most services can fall prey to both technical vulnerabilities and social engineering attacks.  Let’s dive into the details of stolen VPN logs, file system vulnerabilities, as well as the increasingly popular (and highly effective) phishing attacks. Social Engineering Attack Vector The switch to remote work has been a gold mine for ingenious social
Guest Contributor   , ,
data breach
Customer dissatisfaction with WAFs stems from various factors including cost (as highlighted in our previous blog) but what about security and performance? It’s very possible organizations are not using their WAF to its fullest potential. A common and rather concerning trend among recent WAF studies are many organizations keep their WAF on detection (or bypass) mode only: 43% of respondents in a survey by the Ponemon and Sullivan institutions said they rely on WAFs to
Web Security Tips   , ,
broken glass
All commercial VPNs have been marketed as the best and most convenient pieces of technology for users looking to improve their privacy. VPN providers make bold affirmations, like, “we provide 100% Internet privacy protection, avoid tracking and monitoring, and even circumvent censorship and geo-restricted content.” But what many people don’t know is that VPNs were initially created to extend private networks (LANs/WANs) to other geographies using the Internet — (NOT really as privacy tools).  So,
Guest Contributor   , ,
remote access
According to the 2012 Data Breach Investigations Report, in 2011 remote access risks were behind 95% of all malware occurrences and 88% of hacking violations. These worrying figures were compiled by Verizon’s RISK team, in conjunction with the US Secret Service and other notable international security agencies. The report proves that so long as your employees have remote access, you’re in danger of cyberattacks. Why Organizations Ignore Remote Access Risks The benefits of remote access
Web Security Tips   , ,
cloud based
WAFs are an integral part of an organization’s cybersecurity strategy – especially if data security is a top concern. Web application attacks are the most likely vector for a data breach attack and hence require adequate monitoring and protection. However, Not all organizations are pleased with their WAFs, as there are both good and bad WAFs, and other organizations may be hesitant to invest in a WAF. One of the main reasons organizations may be
Web Security Tips   , ,
Web Application Firewall
The 2018 Trustwave Global Security Report took a close look at one hundred IT companies and found that each one of them had at least one security vulnerability – but mostly more. This is a gentle reminder that your company is also vulnerable to exploits. Even the best security practices during development and deployment can’t account for all the threats. There are just too many ways to exploit web applications, and the number grows by
Guest Contributor   , ,
cybersecurity
Due to the current pandemic situation, it seems like working remotely will prevail. Remote work has a range of benefits for both employers and employees.  For some employees, it renews their passion for work and makes them more productive (at least, 77% of employees believe so), as they are more inspired by their surroundings and the absence of traffic jams.  Employers obviously benefit from increased productivity. But what about security? Regardless of a pandemic is
Guest Contributor   , ,
application security
Applications are a critical part of our lives today. In a software-driven world, businesses use applications to interact with their prospects, partners, and customers. However, traditional information security practices and technology have not been able to keep up with the fast evolution of applications.  Enterprises are continuously building, buying, and using applications at a breakneck pace and in record numbers. Using open-source components and third-party applications to speed up the software development process has become
Guest Contributor   , ,
remote access control
When it comes to remote access solutions, you may be looking for solutions that come equipped with features that can strengthen the security of your organization.  Unfortunately, a lot of these remote access solutions like business VPNs and remote desktop software don’t always come with the best security functions. Whether you’re looking to meet compliance standards or concerned about sensitive data and records leaking to malicious actors, your organization can benefit significantly with access controls. 
Web Security Tips   , ,
remote access solutions for business
The growing trend of remote working brought upon the COVID-19 pandemic has spurred many organizations to look for remote working solutions. Ideally, these solutions should offer secure access to corporate files from remote devices.  Because employees and staff are now accessing files from locations outside of the traditional workplace, remote working security has become a hot issue.  If your employees are working remotely, it’s nearly impossible to make sure that each employee follows the proper
Web Security Tips   , ,