CurrentWare version 7.0.1 is here! With this release we’re excited to announce the introduction of two key security features: Two-factor authentication (2FA) and our first two admin activity logs! These enhancements provide an extra layer of security to help ensure that only trusted operators are accessing your admin console while providing greater visibility into what they are doing within the CurrentWare Suite.
As the digital transformation continues at full speed, the majority of humanity's routine activities have begun to be carried out through digital channels. As the world digitizes, the potential loot in the lap of hackers grows. That's why we witness the development of new cyber threats every day. This requires all organizations, from the smallest to the largest, to be prepared for advanced cyber attacks.
Cybersecurity strategies within cloud environments are often seen as a complicated landscape with rapidly developing technologies, architectures, and terms. Simultaneously, there are continuously motivated individuals and groups trying to utilize vulnerabilities for illicit uses such as to increase access to the data, install malware, disrupt services, and more.
While the stakes for private sector organizations differ drastically from governments that have to protect state secrets like hacking tools or nuclear technologies, businesses do have their own needs for Data Loss Prevention measures. Organizations can face the threat of data like their intellectual property (IP), source code, customer details, Personally Identifiable Information (PII), financial info, and many other types of information being stolen or corrupted.
This is the important question that Veriato Head of Product & Technology, Jay Godse asks in his new article, published this week. With so many employees working from home, it’s hard for CISOs, managers and HR leaders to know what they are doing, and that creates risk. Don’t wait until it’s too late. Threats to the company are much harder to spot when people are working at home.