Privileged Access Management - The Importance of Secrets Management
May 26, 2021

Privileged Access Management - The Importance of Secrets Management

As cloud adoption and automated service use grow to increase faster processing and improve resilience, our reliance on these same technologies requires them to access critical data. Automated development, testing, and deployment offer considerable improvements in agility but create security risks at the same time.

Cybersecurity in Healthcare: Considerations for Improvement
April 19, 2021

Cybersecurity in Healthcare: Considerations for Improvement

The healthcare environment has become a prime target for cybercrime over the past number of years. Attacks on healthcare grew with the Covid-19 pandemic as cybercriminals targeted hospitals, vaccine research companies, and other frontline healthcare provider organizations. With the treasure trove of highly valuable Personally Identifiable Information (PII) and more specific Protected Health Information (PHI) held by healthcare providers and facilities, these environments' targeting will likely continue to grow and become more sophisticated.

Extended Detection and Response (XDR)
March 03, 2021

Extended Detection and Response (XDR)

XDR is an alternative to the reactive endpoint solutions that provide only single-layered visibility over specific points. Though these layer-specific solutions are quite effective, they deliver a large volume of alerts that require a considerable amount of time in their investigation, response, and management.

5 Tips to Overcome the Cybersecurity Challenges of Remote Work
January 21, 2021

5 Tips to Overcome the Cybersecurity Challenges of Remote Work

The remote workforce that the world is encountering has brought benefits and risks for companies and their employees. Some of the benefits are lower business expenses, employees' ability to work remotely, a more flexible schedule, and many others. Unfortunately, working remotely also comes with risks.

Steps to Improve Cybersecurity as Your Employees Return to the Workplace
January 13, 2021

Steps to Improve Cybersecurity as Your Employees Return to the Workplace

It is likely that after working remotely for over a year, companies around the world will soon expect their employees to return to the office.

Is Your Remote Working Security Checklist Effective?
December 14, 2020

Is Your Remote Working Security Checklist Effective?

After struggling for almost a year, things are finally getting back to normal. Not in the way they were before, but after being under lockdown for so long, people are adapting to this new normal.

The Growing Importance of Endpoint Security
December 07, 2020

The Growing Importance of Endpoint Security

What to make of this world driven by technology- is it a benefit or a problem for society? The truth is - both.

Why USB Policy Matters
September 28, 2020

Why USB Policy Matters

Honeywell released a report that over 40% of USB portable storage devices contain at least one risky file and over 25% of those threats could lead to operational issues. In 2018, IBM’s chief information security officer, Shamla Naidoo, released a statement focused on digital hygiene and IBM’s steps towards banning portable storage devices, including USBs. Similarly, the French National Assembly has worked to raise cybersecurity awareness with a similar aim to ban USB sticks during their meetings. With companies, and even countries, working to ban the use of USBs, it can be difficult for enterprises to know what decision they should make when it comes to USB policy. One way or another, enterprises need to address the issue and strictly enforce these policies to avoid catastrophic breaches. Recent security breaches and mishaps with USBs should serve as a warning to enterprises still using them freely and without restrictions.

Key Cybersecurity Considerations When Onboarding New Employees
September 14, 2020

Key Cybersecurity Considerations When Onboarding New Employees

It’s a common misconception that the only threats to an enterprise’s security come from external actors. Whether intentional or not, 47% of organizational data breaches are the result of internal human error, such as a misplaced device or document. Moreover, some employees present an even larger risk than others. According to recent reports, younger employees are more likely to bypass security protocols that are viewed as an impediment to their productivity. When it comes to onboarding new employees, young or old, enterprises must have proper security awareness & anti-phishing training, in addition to a strong privileged access management solution, to guard against the different types of human error that could create security vulnerabilities.

Contact Details

Contact RevBits

Message icon Request a Demo