article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

According to the Guidance, employers must implement the following measures to secure their information systems: Ensuring that they have an IT charter or information security policy in place covering teleworking, or, at the very least, a set of minimum rules that must be complied with by each teleworking employee.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. So what’s stopping us from getting rid of passwords altogether? Passwords may have been very effective securing Roman roads.

Passwords 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

.” LAPSUS$ seems to have conjured some worst-case scenarios in the minds of many security experts, who worry what will happen when more organized cybercriminal groups start adopting these techniques. “They were calling up consumer service and tech support personnel, instructing them to reset their passwords.

Phishing 231
article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

Secure and successful management of data access may still be an Achilles’ heel for many organizations, but if there’s a silver lining to cloud breaches, it’s that they highlight where changes need to be made. Investments in IT security are on the rise and policies are evolving for the better.

Cloud 115
article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

They need to maintain an easy user management access for cloud-based applications and services, without compromising on security. Pandemic intensifies the need for secure remote access management. Even before the onset of the pandemic, many risk and IT leaders were concerned with more secure access for remote workers.

Cloud 62