Remote Access Security

Remote Access Security | News, how-tos, features, reviews, and videos

secure remote work
cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

water infrastructure / wastewater treatment facility / sewage treatment plant

Exposed VNC instances threatens critical infrastructure as attacks spike

Threats surrounding Virtual Network Computing laid bare as attacks targeting critical infrastructure increase.

FireMon network security policy management

Tips to prevent RDP and other remote attacks on Microsoft networks

Microsoft is deploying new features and defaults to help keep threat actors from remotely accessing networks, but you can do more.

security command center monitors control center getty goro denkoff

Splashtop teams with Acronis for remote security support

Scalable offering claims to allow security-focused technicians to troubleshoot problems without leaving Acronis console.

VPN / network security

How to choose the best VPN for security and privacy

Virtual private networks still have a place in the enterprise for protecting data and networks. Here's what you need to know when selecting a VPN.

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

Remote code execution flaws in Spring and Spring Cloud frameworks put Java apps at risk

Users are urged to update both the Spring Framework and Spring Boot tool.

remote work concept working at home telework picture id1223790327

CISOs, what's in your work-from-home program?

CISOs reveal how their secure remote work strategies are set up for the long haul.

wireless security vulnerability

Researchers warn about continuous abuse of unpatched MikroTik routers

Attackers are still exploiting unaddressed vulnerabilities in an estimated 300,000 MikroTik routers. A new tool will detect compromised devices.

virtual connections / social networking / remote teams

7 VPN alternatives for securing remote network access

Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.

VPN / network security / magnifying lens / country names

India Inc. has other options if VPNs are banned

VPNs can provide secure, remote access to an enterprise network. If their use is banned, there are other means for businesses to secure access.

VPN security vulnerabilities  >  VPN alert / warning / network servers

VPN risks: What the joint cybersecurity alert means for Australian CISOs

VPNs have emerged as a new vulnerability as remote work surges, as security centres struggle with patching software and identifying weaknesses, warn the Australian, UK, and US security agencies.

An unknown number calls a mobile phone amid pixelated data.

Scammers’ Australian windfall bodes poorly for cybersecurity’s human defences

Company culture is the soft underbelly that scammers can exploit, using the same techniques to access corporate data which fool employees in their personal lives.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to protect Windows Remote Desktop deployments

Attackers gain access to your Windows network just as work-from-home employees do: remotely. Following these simple steps will send them looking for easier targets.

Casual man with beard seated at home office with smart phone

10 things work-from-home employees can do now to help protect the network

WFH employees are now more susceptible to attacks that steal credentials or plant malware. Have them follow this advice to better protect themselves and the business.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

Load More
You Might Also Like