The ITOM Podcast returns with yet another episode to help you eliminate all the remote work woes in your IT environment. In the last episode, we discussed in detail about the key areas enterprises need to monitor to ensure endpoint security, measures to adopt to ensure cybersecurity while rolling out BYOD policies, and the crucial factors that IT leaders need to know about in the post-pandemic era with respect to IT security.
Gear up! The ITOM Podcast is back with an all new episode intended to help you surmount all your remote work challenges in an IT environment. In the last episode, we discussed VPN monitoring in detail, the challenges encountered while monitoring VPNs, and the key metrics to track to overcome those challenges. This week, we will deep dive into endpoint security and BYOD policies.
The Protection of Personal Information (POPI) Act puts South Africa’s data regulation standards on par with existing data protection laws around the world. It aims to protect personally identifiable information (PII), enforce individuals’ rights to privacy, and provide guidelines for lawfully processing sensitive information and notifying regulators and data holders in the event of a breach.
Data is the cornerstone of most businesses. Companies handle a substantial amount of data every day, and just one data breach can result in compliance violations, lawsuits, and more, costing the company thousands of dollars. Here at ManageEngine, we believe that part of what makes a business successful is having an efficient security solution. Taking that one step further, we have designed the perfect security solution for Microsoft 365: M365 Security Plus.
As the COVID-19 pandemic rages on, many educational institutions have been forced to shift their on-campus classes to online classes. Various EdTech platforms have also launched free classes that have prompted students to try their hands on digital education. With more students turning to online learning than ever, these platforms have emerged as a lucrative target for cybercriminals.
The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. This framework was created through collaboration between various private-sector and government experts to provide high-level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes.
In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and Elon Musk.