Your cyber intelligence source

4 ways hybrid working changed security forever

A perfect storm of home workers loving their freedom and attackers upping their game has cultivated a dangerous cyber landscape. Here’s how to crime-proof your business...


When the pandemic first broke, IT and security leaders became heroes – the ones that saved the day… and the company.

But, as the crisis drew on and lost its life-or-death immediacy, IT teams faced widespread pushback from workers who resented curtails on their newfound WFH freedoms.

This IT faceoff, as well as changing user behaviour and ever-more sophisticated attacks have cultivated a thriving breeding ground for new cyber risks.

1 People are using their home machines differently – and being phished

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image
share