– Security professionals tend to think about the ‘latest and greatest’ and the next big thing, such as how AI will be the next great tool in security. But hackers are beating defenses with basic tradecraft. It’s usually not anywhere near the level of sophistication one might think. The challenge companies face is getting security in place that is useful and helps people do their jobs, but keeps bad user behavior from being a persistent threat. Also, the cybersecurity talent shortage is becoming a real issue – there is no simple answer except greater reliance on security software
– Data breaches in financial services are unfortunately nothing new. They’re usually high profile, targeting the likes of likes of Wonga, Tesco Bank and Nationwide Building Society, and are typically the result of outside forces. While some place the blame for these breaches on legacy systems’ inability to cope with new forms of cyber attacks, or third party companies and vendors, the role of the insider is less considered.
– Just because you’ve built support options, doesn’t mean they are right for customers. William Culbert of Bomgar explains what you should be checking to ensure your helpdesk customer service is performing.
– Secure screen sharing arrives as Bomgar responds to prevalence of Apple mobile devices in the workplace. Service desks can now support customers using iPad and iPhone thanks to Bomgar’s newly released screen sharing tool. Technicians will be offered a full screen view of the customer’s screen with embedded chat functionality, meaning they can quickly troubleshoot IT issues specific to Apple iOS devices.
– Products are now available on-premise, as cloud and in the Azure private cloud Bomgar has partnered with Microsoft Azure, giving businesses the option to deploy its secure access products - virtual remote support and privileged access - in a private cloud environment.
– IT professionals must have a clear view of every device in their networks and ensure that no element of the environment is overlooked. In a landscape full of high-profile data breaches, such as Yahoo and Tesco Bank, we’re seeing more and more organisations looking to bolster their defences in order to protect their business critical assets. However, are organisations overlooking the smaller, intermediate devices in their network that could provide an access point for the craftier cybercriminal?
– Recent research from Forrester finds that 80 percent of breaches involve the exploitation of privileged access. Several high-profile breaches, including those affecting Anthem, Sony and Home Depot, are examples of incidents where a criminal took advantage of privileged credentials to illegally gain access to a corporate system.