Blog


On the Tech Fusion Podcast by Citrix – How Does Remote Work Affect Cybersecurity?

A conversation about the NOW of cybersecurity – with remote work here to stay. How we can help companies to get there. The Switch Has Been Flipped – and There’s No Going Back. Coming up on the one-year anniversary of COVID-19 lockdowns, the enterprise has seen enormous change. And remote work, experts say, is likely […]


TraitWare delivers simple, secure access to Citrix Workspace

Citrix continues to empower companies to have better and more secure access to enterprise resources. Now, it has expanded its capabilities and enhanced user experience, efficiency, and security by deploying modern authentication integrations for Citrix Workspace via SAML 2.0. What is SAML 2.0? Security Assertion Markup Language (SAML) is an XML-based open standard for transferring identity […]


What Makes Small Businesses Vulnerable to Cyberattacks?

The average total cost of a data breach in the U.S. is $8.19 million, more than double the world average. Some of that cost lands squarely on the laps of small businesses, who are not safe from cyberattacks themselves. According to Verizon’s 2020 Data Breach Investigations Report (DBIR) calculations, small businesses account for almost one […]


Are You Using the Most Effective Cloud Security Controls?

No doubt enterprises have embraced the cloud, but how about optimizing their cloud security controls? It seems that many enterprises are still not using the crucial tools offered by their cloud provider to ensure tracking, better control user access, and enhance security at every turn. To get the most out of your cloud services, you […]


4 Types of Employees with the Greatest Risk for Phishing Attacks

Phishing attacks are making a serious comeback, thanks in huge part to the COVID-19 pandemic. According to the 2020 Phishing Attack Landscape Report, commissioned by GreatHorn and conducted by Cybersecurity Insiders, companies are experiencing an average of 1,185 attacks every month, resulting in 15% of organizations having to spend around one to four days reversing […]


6 Mistakes to Avoid When Deploying Multi-Factor Authentication

The combination of username and password is no longer enough to secure your data. This is why multi-factor authentication (MFA) is being adopted by a growing number of organizations and businesses.  The goal of MFA is to throw three or more hurdles at cybercriminals to deter them from pursuing access to your network to get […]


4 Technologies to Improve Your Security for the Pandemic and Beyond

For security teams, the COVID-19 pandemic either introduced new challenges or magnified old ones. Because of this, many organizations are assessing new security technologies or speeding up the deployments of others, which have already been in the works. For businesses, the pandemic has made it necessary for security teams to protect widely scattered endpoints and […]


7 Mistakes and Oversights to Avoid in SSO Implementation and Management

By allowing users to execute a master sign-on to authenticate themselves, single sign-on (SSO) improves user experience in terms of convenience as well as security. However, while SSO takes away the hassle with logins, successful implementation requires diligent management and the proper tools. Because the truth is implementing SSO requires some work and an unerring […]


What Are the IAM Configuration Mistakes Businesses Can’t Afford to Make?

Identity and access management spells sound cloud security—provided that permissions are properly configured. If not, then a business is essentially risking its success, even its survival in the event of a major breach that results in loss of data, clients, and the support of stakeholders.   Vital cloud services (e.g., Google IAM, Microsoft Azure Active […]


Why Multi-Factor Authentication Is Essential for Healthcare

Security and data breaches are a major concern for every organization. Companies in the healthcare sector are especially vulnerable: they are a top target for cybercriminals because the black market value of medical data is exceptionally high. According to Experian, medical data sells for more on the dark web than credit card information or other […]


What Are the Best Practices for User Provisioning and De-provisioning?

  User provisioning is a standard component of onboarding and involves creating user accounts for a newly hired employee. It entails access to IT resources (including the directory) and to systems, networks, and applications that are vital to the employee’s performance of their job. The usual IT resources provided to a new employee include the […]


How Can You Optimize Passwordless Authentication?

Have you gone passwordless yet? Making the switch may be the best security move you can make today, because passwords are becoming even less secure, especially when you consider users’ tendency to have poor password security habits. For example, 52 percent of users reuse the same password for multiple accounts, and 59 percent of American […]

X
wpChatIcon