Remove CSO Remove Risk Remove VPN
article thumbnail

BrandPost: Mercury Financial gains a competitive advantage with zero trust

CSO Magazine

Dedicated to continuous improvement through innovation, Mercury Financial recently transformed its traditional security architecture and built a risk-based, cloud-native security program.

article thumbnail

Pulse Secure: New Deadline for Government to Patch

SecureWorld News

The team worked quickly to provide mitigations directly to the limited number of impacted customers that remediates the risk to their system. CISA has determined that this exploitation of Pulse Connect Secure products poses an unacceptable risk to Federal Civilian Executive Branch agencies and requires emergency action.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity First: #BeCyberSmart at Work and Home

Security Through Education

Connect to a secure network and use a company-issued Virtual Private Network (VPN). Typically, corporate networks are equipped with firewalls, a Chief Security Officer (CSO), and a whole cybersecurity department to keep them safe. Lock down your login. Keep your personal and corporate devices on separate Wi-Fi networks.

article thumbnail

Best advice for responding to today's biggest cyber threats

CSO Magazine

This may not be a time to roll out new technologies or major changes to your network, as this will introduce other types of risk. They will merely hop on another VPN and come in from another location. Instead, consider taking these steps in response to current events. Block traffic selectively.

article thumbnail

Security Roundup November 2021

BH Consulting

ENISA considered the risk to the latter category so significant that it dedicated an entire report to it.) A report by Restore Privacy found that some untrustworthy companies are not just buying VPNs to consolidate the industry, but also snapping up the ‘review’ sites that rank them highly.

article thumbnail

Security Roundup October 2023

BH Consulting

It found the most common intrusion tactics are phishing emails containing malware, Remote Desktop Protocol (RDP) brute forcing, and exploiting Virtual Private Network (VPN) vulnerabilities. MORE Cybersecurity and risk spending look set to increase in 2024, Gartner forecasts. MORE Have you signed up to our monthly newsletter?

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

We asked two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Instead of arguing about MFA strength, VPN vendor, or nation-state treat actors, let’s finish our conversation about using dedicated administrator accounts and unique passwords.