Remove best-travel-vpn
article thumbnail

Best Practices to Make Sure VPN Access Remains Seamless

eSecurity Planet

Many organizations have used VPNs for years to provide seamless connectivity without compromising security for employees who travel or work remotely. These VPN endpoints are typically set up to support 5 to 10 percent of a company’s workforce at any given time. Enhance VPN Security.

Access 93
article thumbnail

ICO Fines International Airline Cathay Pacific GBP 500,000 (Maximum Available) for Failing to Secure Customers’ Personal Data

Hunton Privacy

Approximately 41,000 network users were permitted to authenticate past the VPN using just a user ID and password, without multi-factor authentication. Best practice (as outlined in Cathay Pacific’s privileged accounts standards) is to avoid this and adhere to the concept of “just enough administration” and “just in time administration.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Whether motivated by a potential payday or the ability to access confidential information, cybercriminals have plenty of incentive to focus on what works best in achieving their goals. This article focuses on the top five attack vectors organizations should look out for and defend against in 2022. Remote Technology. Pierluigi Paganini.

IoT 124
article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

Below, we’ll cover the good, the bad, and the just plain creepy of employee monitoring — along with consequences, both intended and unintended — to help you find the best way to make sure your employees are on-task. Check Out Secure Access for Remote Workers: RDP, VPN & VDI. What is Employee Monitoring and Why Use It?

IT 111
article thumbnail

Keeper vs 1Password: Compare Password Managers

eSecurity Planet

Other security features include travel mode, virtual payment cards, and clipboard clearing. Also read: Hackers Leak 87,000 Fortinet VPN Passwords. Choosing the best password manager for your organization depends on the native integrations you need, your reliance on mobile applications, and any compliance regulations you have to follow.

Passwords 102
article thumbnail

How to Improve SD-WAN Security

eSecurity Planet

This article looks at the security functionality of SD-WAN solutions and how to bolster SD-WAN cybersecurity. The SDN approach makes the most of modern virtualization and remote network management capabilities and reduces unnecessary travel and deployment costs. Also read : Best Business Continuity Software. SDN vs SD-WAN.