article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

Implementing a Virtual Private Network (“VPN”) solution to avoid direct exposure of the organization’s services on the Internet. If possible, organizations should enable two-factor authentication for VPN login.

article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

“They would just keep jamming a few individuals to get [remote] access, read some onboarding documents, enroll a new 2FA [two-factor authentication method] and exfiltrate code or secrets, like a smash-and-grab,” the CXO said. “These guys were not leet , just damn persistent.” ” HOW DID WE GET HERE?

Phishing 240