Latest News

MSP Insights

Securing Push Notifications From MFA Fatigue Attacks

Learn how to implement and use better, more secure push notifications like your security depends on it.

Read the article
Security Magazine

4 Ways to Identify and Prevent Insider Threats

Risks abound in the current cyber threat landscape, but now isn't the time to lose sight of insider threats.

Read the article
Infosecurity Magazine

What You Should Do When Two-Factor Authentication Becomes a Security Requirement

As you prepare to incorporate 2FA into your digital security protocols, there are several other questions you should consider.

Read the article
Infosecurity Magazine

Stand Down, Marketers: Zero Trust is Not a Product

Don’t be put off by the cold, heartless term ‘zero trust.’ Instead, take it onboard, run it up the flagpole and encourage a new sweet spot for your organization.

Read the article
Technative

Single Sign-On: Balancing Power and Responsibility 

Learn how IT teams can harness the power of SSO, wielding it as not just a productivity tool, but also as a security tool.

Read the article
CyberProtection

4 Tips to Meet Cyber Insurance Requirements and Save 

Focus on lowering your risk profile, and you’ll be able to negotiate lower cyber insurance premiums and enjoy long-term savings.

Read the article

What's Next for MFA

For MFA adoption to really take off, organizations need to understand the real value of MFA and how to effectively implement it.

Read the article

Access management builds resilience to insider threats

In a public sector environment, the smart use of access management software can prevent attacks – without negatively impacting employee productivity and morale.

Read the article

SSO Protects Cloud Access Using On-Premises AD Identities

The release of UserLock 11.1 allows organizations to enable single sign-on for cloud applications using existing on-premise Active Directory credentials.

Read the press release

Data security in the age of insider threats: A primer

Identifying insider threat personas is difficult. But the consequences of failing to do so are great.

Read the article

Is Data Security Worthless if the Data Life Cycle Lacks Clarity?

If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.

Read the article

Least Privilege is Not Sufficient On its Own

The principle of least privilege is intended to create an environment that, while providing elevated access, still limits risk.

Read the article

Using Access Management for Your Active Directory Users

It’s no secret that Active Directory (AD) credentials can easily be compromised. This is the reason why it is absolutely crucial for organizations to secure those credentials to protect against network breaches.

Read the article

Cybersecurity threats in Africa and keeping users safe

Africa is growing quickly in terms of population, economy, and global influence. Technology adoption continues to rise in Africa. However, with this growing prosperity and digitisation comes new risks and vulnerabilities that could undermine progress.

Read the article

Understanding the “After” Can Help MSPs Protect Against Ransomware

Everyone is familiar with the machinations of the criminal moneymaking scheme that is ransomware. We have much less visibility into and understanding of what happens “after” the attack, however, which has become cyberthieves’ main business. 

Read the article

Why should you use Access Management for Active Directory users?

Active Directory (AD) credentials can easily be stolen. This is why securing those credentials is absolutely crucial for any organization to avoid breaches.

Read the article

Are Some Companies’ Right to still avoid Multifactor Authentication?

Using only a strong user name and password doesn’t cut it anymore. Companies without MFA are wide open to attacks despite the other security solutions they may have in place.

Read the article

How VARs And MSPs Can Help SMBs Secure Data In The Cloud

The increasing use of cloud storage platforms has changed the way companies work. This is a big opportunity for managed service providers (MSP) and value-added resellers (VAR) and they need to take advantage of it.

Read the article

SMB security fears for cloud data storage - and how to overcome them

The cloud has benefited organizations for many years now. But despite all the benefits it brings, suspicion is still present.

Read the article

Two-factor Authentication and the myths that surround it

As you know by now, corporate credentials can be compromised quite easily and represent one of the most dangerous threats to any organization. MFA can help.

Read the article

Remote Working: Protect Your Active Directory Logins

The past couple of months have been intense for most companies since they had to shift to working remotely. This situation is unfortunately a huge opportunity for cyber-attackers.

Read the article

Why are SMBS still suspicious about cloud storage security?

SMBs find it hard to trust a third party with their data because of the lack of visibility and control.

Read the article

Organizations have the wrong idea about Multi-factor Authentication

Multi-factor authentication (MFA) constitutes one of the most effective controls to prevent unauthorized access. Without MFA in place, all of the other security measures can be bypassed.

Read the article

Key indicators of compromise to prevent a breach

Let's have a look at the different indicators of compromise and which one is the easiest to observe.

Read the article

Detecting & Preventing Insider Threats To Your Company: An Overview

It’s commonly understood that the greatest risk to any organization comes from the insider threat, no matter which industry or sector you work in.

Read the article

Most compliance requirements are completely absurd

Compliance is probably one of the dullest topics in cybersecurity. Let’s be honest, there’s nothing to get excited about because most people view it as a tick-box exercise.

Read the article

How to Stop External Cyber-Attacks and Lateral Movement

External attacks represent 72% of data breaches today. It’s critical for organizations to understand how they can stop them.

Read the article

Why Should You Use Access Management For Active Directory Users?

It is very well known that Active Directory credentials can be compromised quite easily. It is therefore vital for companies to better secure those credentials in order to avoid a network breach.

Read the article

Why The Reluctance In Adopting MFA?

The sad reality is that organizations that don’t use multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. So, how can you explain the reluctance in adopting MFA?

Read the article

Top priority security measures for businesses

The truth is, without multi-factor authentication (MFA), businesses are open to attacks if their employees fall for phishing scams or share passwords, which happens much more than you think (yes in your organisation too).

Read the article

Why Do SMBs Believe Their Data is Unsafe in the Cloud?

The cloud has been around for many years and has fundamentally changed the way companies do business by opening up a whole new world of employee collaboration and productivity. But SMBs are still doubtful about its security.

Read the article

Windows Logon Audit Far Beyond Native Windows Security

Windows logon auditing is an important activity for diverse security and compliance needs.

Read the article
Dark Reading

11 Tips for Protecting Active Directory While Working from Home

To improve the security of your corporate's network, protect the remote use of AD credentials.

Read the article
SC Magazine

Covid-19 & confinement: Going from face-to-face to remote work

The current Covid-19 (Coronavirus) situation all over the world forces companies to change their operating mode from face-to-face to remote work.

Read the article
SC Magazine

MFA & what it means for companies who go without

Just 38 percent use MFA to strengthen network credentials. Why the reluctance in adopting MFA? There are common misconceptions, such as, that a company needs to be a certain size to benefit from MFA.

Read the article
Dark Reading

The Myths of Multifactor Authentication

Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?

Read the article
Infosecurity Magazine

Why SMBs Still do not Trust Cloud Storage Providers to Secure their Data

What exactly are the specific issues SMBs have with data in the cloud?

Read the article
WhaTech

Two thirds of SMBs believe their data is unsafe in the cloud

Two thirds (61%) of small- to medium-sized businesses (SMBs) believe that their data is unsafe in the cloud, with almost a third (29%) saying that they have suffered a breach since moving to the cloud for storage.

Read the article
Healthcare Executive Network

Going beyond security awareness training for healthcare professionals

IT professionals are fighting to secure information, appropriate access and confidentiality. But creating a culture of safe IT practices is not going to be enough.

Read the article
Professional Security

Data cloud decisions

Almost two-thirds of small- to medium-sized businesses (SMBs) believe that more work needs to be done to protect their data in the cloud.

Read the article
Technative

How do you know you’ve been compromised?

In today’s worlds, organizations are facing the threat of compromise that is ever-present, ever-changing, and ever-gsingleing. The questions is: who and what exactly, are you fighting?

Read the article
Cyber Defense Magazine

Information security advice for small medium business

Smbs have become a lucrative target because most do not have sufficient defenses in place to protect, detect or react to attacks.

Read the article
Information Week

Security: Why Education will Never be Enough

After more than a decade of trying to educate users, IT security professionals still aren't getting their message through.

Read the article
Health Management

Managing access to a Windows network for healthcare organizations

The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are.

Read the article

Read more news