How to Protect Your Network Against a Ransomware Attack

ransomware attack security

Cyberattacks against mid-market and enterprise organizations are on the rise. From man in the middle (MitM), distributed denial-of-service (DDoS) and SQL injections, to zero-day exploits and phishing, cyberthreats are getting more sophisticated, more prevalent and more costly. But one type of cybercrime reigns supreme: ransomware.  Not-so-fun facts about ransomware today:  Ransomware cost the world $20 billion in 2021. That number is expected to rise to $265 billion by…

Read More

The Coronavirus & the Cloud – A Winning Combination for Hackers

information security challenges

Originally posted on People and Computers “The combination of changing work patterns due to the coronavirus, with the increasing migration to cloud environments, creates a new and significant challenge for corporate information security managers,” said Ofer Amitai, one of the founders and CEO of Portnox, explaining how it can be answered at the identification stage.…

Read More

REvil Ransomware Attack Illustrates IT Systems Need for Epidemiological Investigation

revil ransomware portnox

Originally posted on CTECH Examining the REvil ransomware attack The recent REvil ransomware attack has revealed that our computer systems are vulnerable to unknown and surprising pathogens, similar to our vulnerability to Covid-19. The hackers claim that the attack penetrated more than a million workstations, and demanded about $70 million to unlock them. However, the…

Read More

To Fight Ransomware Hacks Drain the Cryptocurrency Swamp

ransomware hacks portnox

Originally posted on Times of Israel These ransomware hacks, or kind of digital extortion – increasingly viewed as terrorism – would be impossible without the ability to move money around anonymously Last month, a cybercriminal group penetrated the Colonial Pipeline. This wasn’t just “another” one of those ransomware hacks, with privacy consequences and threats on…

Read More

SASE & the Future of Network Access Control

The current enterprise network security practices focus on verifying the identity of the user and the device in a perimeter-less environment, where cloud-hosted technologies prevail in the enterprise and where remote sites include branch offices and employees working from home. In Gartner’s paper “The Future of Network Security is in the Cloud”, one of the…

Read More

Setting up Secure Remote NAC through VPN & VDI

how to set up remote network access control

Any IT team can set-up remote network access with minimal guidance. Without the proper parameters, however, this remote access has the potential to be open to everyone – not just for those it was designed to serve. When setting up secure remote network access control, there are three components to consider: 1) application access, 2)…

Read More

Portnox Partners with Distology for Sole Distribution of Cloud-Delivered Network Access Control (NAC) Solution in United Kingdom & Ireland

portnox pr logo

Partnership Will Drive Increased Adoption of Portnox’s Cutting-Edge NAC Solution Purpose-Built for Large Distributed Organizations in the Region LONDON — Portnox, which supplies network access control (NAC), visibility and device risk management to organizations of all sizes, today announced that it has partnered with Distology for the sole distribution and resell of its cloud-delivered NAC-as-a-Service…

Read More

Controlling Network Access in an SD-WAN World

Why SD-WAN? Why Now? The rise of Software-as-a-Service (SaaS) and cloud services is resulting in decentralized data traffic flows, in turn rendering the traditionally expensive Mutliprotocol Label Switching (MPLS) inefficient for wide area network (WAN) transport. This has prompted a change in networking architecture and the means of controlling network access. The emergence of software-defined…

Read More

The Truth About MAC Spoofing

The threat behind MAC spoofing When implementing any insurance policy, you need to start with estimating the level of risk, the probability of that risk, and the potential damage should that risk become a reality. One of the network risks that is often presented to demonstrate the ineffectiveness of 802.1x solutions is the ease of…

Read More