How Prepared Were You for the Shift to Mostly Remote Access?

Quick, where were you when you found out you had to work from home? I remember thinking, “Wow, they just shut down Italy. I have never heard of an entire country being shut down.”

Millions of people had to prepare quickly to move their business online in real time (without warning). New skills were learned, access to technology was problematic for some, and fingers were crossed.

Many workers thought the shutdown was for a few weeks tops, but many months later, there appears to be no end in sight. It seems like just yesterday working remotely was a perk for some, and now it is a requirement for most.

Was your team prepared to move to a virtual work reality? If you said, “not very,” you are not alone. The truth is a few progressive companies transitioned easily. But schools, governments and many other businesses and services were underprepared. In the rush to move to a work from home (WFH) workforce — maintaining security remotely took a backseat to productivity and survival and risk.

“In the future — which is now, actually — ‘remote access’ will just become ‘access.'” — Wendy Nather, head of advisory CISOs at Cisco’s Duo Security

The Remote Access Guide Version 3.0

In DUOs new 3.0 version of the “The Essential Guide to Securing Remote Access” they will walk you through the latest breach techniques and how to protect against them. No matter what size your company is at Duo they make security the right thing to do, as well as an easy thing to do with our world-class multi-factor authentication.

DUO is more than just MFA. They also offer Device Trust to automatically detect and remediate unhealthy devices, Trust Monitor to automatically pinpoint login anomalies for clear visibility into all devices (managed or unmanaged) connected to your on-prem and cloud applications.

In This Guide You Will Learn:

  • About specific types of threats targeting remote users
  • Security challenges facing the remote workforce
  • How users are targeted remotely
  • How user devices are targeted remotely
  • How access goes both ways
  • About cloud security
  • How to secure the modern remote workforce

Work anywhere, anytime – this adage has employees connecting to corporate networks via web and cloud apps, as well as remote access services like VPNs and RDP to do their job.

But with this convenience comes a number of threats to users – like phishing, brute-force attacks and password-stealing malware. Devices are also targeted by exploit kits and known vulnerabilities affecting out-of-date software. VPN, RDP, third-party vendor, and cloud and web app access are also targets of malicious hackers.

Learn how to mitigate these attacks in the guide of DUO. Ideal for security, compliance and risk management officers, IT administrators and other professionals concerned with information security, this guide is for any organization that allows remote access to their environment.

Wilt u in gesprek met deze partner?

Er is een mogelijkheid om een exclusief 1-op-1 gesprek in te plannen met deze partner. Meld u aan voor het online event Security Leadership en ontmoet de experts van DUO online!

Laat u inspireren door on-demand security video’s en ontmoet experts tijdens de 1-op-1 gesprekken!



100% korting

  • On demand 20-minute video's
  • Interactieve LIVE sessies
  • Circa twee 1-op-1 gesprekken
  • CPE punten



Standaard tarief

  • On demand 20-minute video's
  • Interactieve LIVE sessies
  • 1-op-1 gesprekken (optioneel)
  • CPE punten

Nuttig? Deel dit bericht!

Blijf op de hoogte!

Mis geen enkele congresupdate en meld u aan voor onze nieuwsbrief!