article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

We asked two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Instead of arguing about MFA strength, VPN vendor, or nation-state treat actors, let’s finish our conversation about using dedicated administrator accounts and unique passwords.

article thumbnail

Top Cyber Security Challenges Post Lockdown

Security Boulevard

It’s important to remember, however, as we slowly transition back into some semblance of normality, that there will be new challenges to face in all facets of life, and the Cyber Security sector is no exception. The post Top Cyber Security Challenges Post Lockdown appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Handling Pandemic Burnout While Balancing Digital Lifestyles and Cybersecurity

Hot for Security

However, the increased exposure to cyber risks is not limited just to the remote-working population. Adapting to digital trends and keeping up with the latest cyber threats, vulnerabilities and attacks will safeguard personal and financial information from threat actors.

article thumbnail

AT&T teams with Cisco to create new managed SASE offering

CyberSecurity Insiders

Each component offers up crucial functions to enable users to connect to resources while controlling cyber risk along the way: AT&T SD-WAN with Cisco. Regardless of location, security policies are consistently applied across users without the performance problems of VPN connections. Zero Trust Enabler.

article thumbnail

How to establish network security for your hybrid workplace

CyberSecurity Insiders

The first security measure businesses adopted during the pandemic was using VPNs that allowed employees to work remotely while still enjoying connectivity and security. Since software updates contain the latest cybersecurity measures, they are essential to cyber risk management in the hybrid workplace.

article thumbnail

Avoid source code leaks on third-party repositories

SC Magazine

If the company has to store code locally, implement a combination of virtual desktop, RDP, and VPN infrastructure to ensure proper segmentation. Cyber threat intelligence should automatically scrape for proprietary source code on third-party sites to alert security teams before it becomes public.