New products of the week 5.30.16

— Bomgar Connect is an easy-to-use, cloud-based remote support solution that enables SMBs to provide fast, reliable support to end-users and customers. Features screen sharing, remote control, file transfer, and chat technology Full Story

Poor Airport Security Practices Just Don’t Fly

— I love living in the Tampa area for a lot of reasons, among them getting to regularly use one of the best airports in the US – Tampa International Airport (TIA). Unfortunately for the folks who run TIA, they had a spot of trouble that was reported earlier this month by the Tampa Tribune and others. Like a lot of places these days, TIA experienced an IT security breach. Unlike a lot of places—because it's an international airport—TIA has to do a lot of explaining. Full Story

Is Your IT Help Desk Helping Hackers?

— Depending on one’s technical competence, the role of a help desk might range from option of last resort to (all too) frequent savior. But whether they’re fixing problems large or small, service desk professionals are often afforded an incredible amount of access. They can view and access a wealth of sensitive systems and information, often with little or no oversight. Full Story

10 steps to ensure success when implementing chat for customer support

— Studies confirm that chat is both a cost effective and user-friendly support channel, but too many organizations add chat without proper planning or have yet to implement a modern chat support solution to support employees, partners and customers. Full Story

IoT security – it’s a job for Privileged Access Management

— According to a recent Gartner report, 43% of organisations are using, or plan to implement, an Internet of Things (IoT) policy by the end of this year, writes William Culbert, the director of solutions engineering EMEA at Bomgar. While there are many benefits for embracing the mainstream adoption of IoT, such as improved efficiencies, cost savings and enhancing customer experience, it can also bring issues of security to the forefront. Full Story

Third Party Vendors Pose Big Risks To Businesses

— An average company’s network is accessed by 89 different vendors every week. As per the new research by Bomgar on Vendor Vulnerability report, there are more than 600 IT decision makers of medium to large enterprises but only a third knew the exact number of vendors accessing their systems. Full Story

Only a third of companies know how many vendors access their systems

— The average company's network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision makers at mid-sized and large enterprises -- but only a third were confident that they knew the exact number of vendors who had accessed their systems. Full Story

Government slow to mount defense against APTs

— That advanced persistent threats are now the biggest cybersecurity problem government agencies face will not be news to many people. What may still be surprising, however, is just how long this problem has existed. The FBI believes at least one group of hackers has been using APTs against government agencies for at least the past five years -- and possibly much longer. Full Story

Are your vendors leaving you vulnerable?

— Third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly, according to Bomgar. The new study explores the visibility, control, and management that organizations in the US and Europe have over external parties accessing their IT networks. It also uncovers the level of awareness organizations have over the potential risks – such as cyber-attacks and data breaches – that vendors accessing systems remotely can pose. Full Story

Unsecured Vendor Access Creates the Perfect Storm for Cyber Attacks

— Bomgar, a leader in secure access solutions, today announced the results of its new Vendor Vulnerability research, which finds that third-party vendors can be a significant security risk if their access to IT systems are not managed and monitored correctly. The new study explores the visibility, control, and management that organizations in the US and Europe have over external parties accessing their IT networks. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation

770.407.1812