article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Working from home resulted in additional risk management and security challenges for employees, executive leadership, and information technology (IT) teams. The concept of a static login for all user activities is not enough to address the evolving risk landscape where businesses operate. SSO has several benefits and use cases.

article thumbnail

Kaseya Breach Underscores Vulnerability of IT Management Tools

eSecurity Planet

Like SolarWinds, both companies serve large B2B audiences, where Kaseya’s products produce hundreds of end products and services. A reliance on built-in trust between systems and excessive user privileges is a risk that a list of ingredients can’t fix. Managing supply chain risk. Preparing for Criminal Enterprise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ChatGPT at work: how chatbots help employees, but threaten business

SecureList

Given that LLMs are prone to so-called unintended memorization (memorizing unique sequences like phone numbers that do not improve the quality of the model, but create privacy risks) data that ends up in the training corpus can then be accidentally or intentionally extracted from the model by other users. Malicious client.

article thumbnail

The story of the year: ransomware in the headlines

SecureList

This is the era of big game hunting: high-profile B2B targets, big ransom demands, sophisticated attacks, highly sensitive data being stolen, and major fallout from a successful attack. The former target both B2B and B2C, while the latter target primarily the B2C sector. billion in transfers over the last three years.

article thumbnail

Multi-Factor Authentication Best Practices & Solutions

eSecurity Planet

Recently, hackers leaked 87,000 Fortinet VPN passwords , mostly from companies who hadn’t yet patched a two-year-old vulnerability. With more employees working from home, their data was more at risk from weaker networks and personal devices. VPN Authentication. Be sure to include VPNs when evaluating MFA solutions.

article thumbnail

Increasing Your Business’s Cyber Threat Intelligence

SiteLock

With more consumers and B2B enterprises conducting business in the cyber world, security threats are an increasing concern. You can combat this by keeping website security solutions up to date, mandating virtual private network (VPN) use mandatory for local and remote workers, and being diligent about routine tasks like log monitoring.

article thumbnail

The story of the year: remote work

SecureList

A virtual private network (VPN) allows for much more secure connections, but only 53% of workers are using one to access their corporate networks. Should this information fall into the wrong hands, it would not only be problematic for the company, but would put the employer’s own privacy at risk.

Scams 60