Blog & Resources

Total Recall

Single sign-on gives end-users just one strong password to remember to access multiple applications and services.

Human memory is fickle. We forget the name of someone we just met, where we parked our car at the mall, even our anniversary. Remembering passwords just adds to the burden.

Why You Need a Cybersecurity Incident Response Plan

Virtually all companies today depend on computer networks to link employees, suppliers and customers, exchange information and facilitate a variety of essential day-to-day tasks. Unfortunately, that makes them susceptible to cyberattacks. It’s why all companies need an incident response (IR) plan — a structured process for detecting, responding to and recovering from cybersecurity incidents.

The Cloud Security Conundrum

Many organizations lack a clear understanding of their role and responsibilities when it comes to securing the cloud.

The COVID-19 pandemic has magnified the value of cloud computing in business operations. The cloud supports work-from-home strategies by enabling remote access to applications and data, while also providing a cost-effective path to scalable IT infrastructure and innovative services.

Endpoint Protection Is Critical for Securing Remote Workforce

Millions of Americans now working from home are potentially exposing sensitive company information by using unsecured endpoint devices, according to several recent studies. An endpoint is a remote device that communicates with the network. In the case of a remote worker, this is typically a desktop, laptop, tablet or mobile phone.

7 Steps that Can Help You Comply with California’s Consumer Privacy Law

Enforcement of the California Consumer Privacy Act (CCPA) began as scheduled on July 1. Any organization covered by the law could be fined up to $7,500 per data record for failure to comply. What’s more, the CCPA allows individual consumers to file lawsuits against businesses for data breaches if the state attorney general declines to prosecute the case.