IT News - Security
2020 May 17
#92063
Most Attacks Successfully Infiltrate Production Environments Without Detection
HelpNet Security, May 6th, 2020

"Additionally, the report includes guidance to help organizations ensure that their security controls perform as expected by implementing a strategy that includes continuous security validation.

'Every organization wants reliable data that tells them if their security investments are delivering real value and protecting them from becoming the next major cyber-attack headline,' said Chris Key, Senior Vice President at Mandiant Security Validation..." - HelpNet Security
(Get More Information . .)

2020 May 17
#92064
Remote Access Best Practices Emphasize Security, Ease Of Use
SearchNetworking, May 6th, 2020

Andrew Froehlich writes in SearchNetworking, "The COVID-19 pandemic has compelled many employees to work from home, forcing companies to deploy new software and procedures designed to permit remote access to corporate data and applications. IT service desk staff have also seen their roles change. For these employees, it's not just connecting to data and apps. They must also access end users' devices to deliver troubleshooting and support services.

That's where remote access comes in. In most cases, remote access software is used to capture the at-home user's desktop, where it is then transported across the internet and mirrored on the IT support staffer's desktop. The software lets IT support staff take control of keyboard and mouse inputs to configure or troubleshoot both the remote OS and any applications or data residing on the end user's device..."
(Get More Information . .)

See all archived IT News - Security articles See all articles from this issue