Fortify Your Network Against USB Threats by Implementing Device Control

Author(s):

Sathya R, Product Specialist, ManageEngine

USB devices and device control

How important is it to protect your organization from USB threats? USB devices are a popular choice when it comes to transferring data, but they can pose significant security risks for your organization. The plus points of USB devices are their size and efficiency; however, if these devices aren’t monitored or restricted appropriately, all it … Read more

,

Securing Endpoints: The Gateways to Your Enterprise

Author(s):

Nikhil Narayan, Product Marketer, ManageEngine

Securing Endpoints - Network

Endpoints across an IT network lay the foundation of every modern-day enterprise.  These endpoints, comprising of laptops, desktops, and mobile devices that connect to the business’s network are seen by malicious actors as potential gateways for data breaches and malware intrusions. According to a study released by Quantitative, the average cost of a data breach … Read more

From the Summer 2021 Issue

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Over the last ten years, remote work has increased by more than 100%; between 2017 and 2018, telecommuting increased by more than 20%. The COVID-19 pandemic altered our working environment, and some businesses discovered that they were unable to transition to a fully remote or hybrid workforce model. At the start of the COVID-19 pandemic, … Read more

The Principle of Least Privilege: The Whats, the Whys, and the Hows

Author(s):

Ameera Azeez, Product Specialist, ManageEngine

the-principle-of-least-privilege

According to a recent infographic, in 2020 more than 70% of cybersecurity breaches happened due to the misuse of privileges. This emphasizes the need for the enterprise-wide elimination of unnecessary privileges, which is exactly what the Principle of Least Privilege (PoLP) advocates. Here is a detailed breakdown of what this principle means for organizations and … Read more

Avoiding Rough Patches Using Patch Management

Author(s):

Aritri Saha, Content Writer, ManageEngine

Patch Management - Patches

Patch management is an essential part of sustaining IT services in this era of malware and growing cyber threats. Letting your guard down in network security makes your organization an easy target for cybercriminals. The responsibility for keeping the network safe and guarded is a herculean task, but automating the process can make any system … Read more

From the Winter 2021 Issue

Still Looking for Cyber Solutions for the Same Cyber Problems

Author(s):

Colby Proffitt, Cybersecurity Strategist, Netskope

Real Time Data

Real-time data, not more tools, critical to reduce risk and make better cyber decisions The job of the Chief Information Security Officer (CISO) has become much more complex over the last decade. With every advance in technology, the amount of risk facing most organizations has also increased. CISOs – as well as Chief Risk Officers … Read more

Business Solutions That Are More Secure in the Cloud

Author(s):

Kayla Matthews, ,

Business Solutions Cloud

One of the big decisions company owners must make is whether to use cloud-based or on-premises business solutions. Here are five solutions that are more secure when hosted in the cloud. Content Storage Google Drive, Dropbox, iCloud and OneDrive are some of the leading cloud-based business solutions. Indeed, these solutions allow people to store documents, … Read more