Press

Can automation solve the IT efficiency vs security challenge?

– Automation will not only make businesses run more efficiently it can also help them lock down security. William Culbert, director of solutions engineering at Bomgar told SITS Insight that IT security is often seen as the enemy of efficiency because it introduces barriers which slow working practices.

Continue Reading

Are You and Your GC in Sync?

– Security threats, mobile employees and a changing regulatory climate have many corporations re-evaluating their current technology and processes to ensure data is protected. As CIOs and CISOs map out developing technology plans and possible procurement initiatives for their organization, it’s critical they collaborate closely with general counsel in several areas, to steer the ship through the challenges of a rapidly changing information age environment.

Continue Reading

Government v Tech: The question of encryption is a battle to infinity

– Postmortem of almost every terror attack leads to a catalogue of YouTube channels, online guides on making explosives and a veritable smorgasbord of information for budding terrorists. After the London Bridge attack, it even emerged that the perpetrators tried to rent a 7.5 ton truck online, failing only when their card payment didn't go through.

Continue Reading

Deep Root Analytics Downplays Giant Voter Data 'Oops'

– A data contractor working on behalf of the Republican National Committee earlier this month allowed the personal data of 198 million voters to be exposed online, marking the largest ever leak of voter data in history, according to the cybersecurity firm that discovered the incident.

Continue Reading

Insight: 90 per cent of UK employees create vulnerabilities through poor cybersecurity practices

– In its 2017 Secure Access Threat report, Bomgar says that when faced with security measures that seemingly hinder efficiency, workers will use shortcuts without considering the risks. The results of the UK study reveal that 90% of employees polled admitted to having stayed logged on to systems, thereby preventing appropriate implementation of security policies such as the automatic rotation of passwords.

Continue Reading

Protecting Against 'Friendly Fire' Security Risks

– It won't come as a surprise to anyone working in corporate IT that not all security threats come from unknown hackers in Russia or Indonesia (or the USA, for that matter). It's also necessary to protect from threats posed by trusted sources who are handed everyday access to the network, such as employees and vendors.

Continue Reading