The Octopus Blog

10 Security Tips For The Remote Workforce

By Inbal Voitiz|March 18th, 2020|Categories: Articles|Tags: , , , , |

1 Phishing is on the rise Attackers acted fast to take advantage of the current Coronavirus health scare. Research shows that customized phishing campaigns intended to steal credentials and spread malware are increasing. Make sure employees use MFA solutions to decrease credential theft risks. Remind everyone - do not click links or open attachments unless sure about the source.   2 [...]

Enabling Remote Work While Ensuring Maximum Security

By Inbal Voitiz|March 16th, 2020|Categories: Articles|Tags: , , , , , , , , , |

In just a few short weeks, remote work has morphed from a perk offered mostly by tech companies to an absolute necessity, as the COVID-19 epidemic continues to disrupt the daily lives of millions of people. Suddenly, companies are forced to enable their employees to work from home on a massive scale, while keeping their productivity up. Oracle, Apple, Google, and [...]

Active Directory In The Age Of The Cloud

By Raz Rafaeli|March 4th, 2020|Categories: Articles|Tags: , , |

For IT pros, Microsoft Active Directory is an old friend. After all, it’s been with us since the early 2000s and (just like many Microsoft products before it) it has, over time, become the backbone of many enterprises IT operations.  Originally developed to manage network resources, AD’s functionality has expanded over the years to embrace many aspects of authentication and identity [...]

SIM Swapping – The End Of 2nd Factor Authentication?

By Shimrit Tzur-David|February 24th, 2020|Categories: Articles|Tags: , , |

Many online services allow, and sometimes require, users to secure their accounts with a registered mobile phone number. This is a common and trusted method for two-factor authentication (2FA), using a phone call or an SMS message to verify identity when logging in from a new device or resetting a password. This standard approach, however, is not always effective in keeping [...]

Cloud Phishing Risks and Mitigation

By Shimrit Tzur-David|February 13th, 2020|Categories: Articles|Tags: , , , , |

If you’re running your business in the cloud, you need secure authentication Most of us underestimate the ramifications of password hacks and cloud phishing attacks. If your password falls into the wrong hands, a hacker will gain access to sensitive information, siphon your bank account, or do some other evil act that will inflict damage on your person or organization. But [...]

Cloud Identity Management Challenges

By Amit Rahav|February 4th, 2020|Categories: Articles|Tags: , , , , |

For years, enterprises have been rapidly adopting cloud technologies for many of their data processing tasks. The area of identity management is no exception. To this day, it is still a particularly fast-growing trend within the cloud revolution. Cloud Identity providers, or IDPs, have been taking the world of IT by storm. According to an estimate from Gartner, cloud-based identity is [...]

x

Get in Touch

x

Get in Touch With Sales