Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

wifi password hacker portnox
Stopping the WiFi Password Hacker with NAC
In the digital age, where businesses rely on seamless connectivity and data exchange, corporate WiFi networks have become the backbone of modern operations. However, a growing concern looms over these networks: the alarming ease with which their passwords can be hacked. In this article, we explore the vulnerabilities that make corporate Wi-Fi networks susceptible to…
Read more»
Multi-Cloud Security
The Challenges of Multi-Cloud Security
At its core, multi-cloud involves using cloud services from more than one cloud vendor. It can be as simple as using software-as-a-service (SaaS) solutions like Salesforce, Office 365, or Dropbox from different cloud vendors. However, in the enterprise, multi-cloud typically refers to the strategic use of multiple cloud providers for running critical applications and workloads. Here, cloud services tend to fall into more specific and technical use cases like platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS), function-as-a-service (FaaS), and container-as-a-service (CaaS).
Read more»
IoT in agriculture
IoT in Agriculture: Secure Smart Farming
The age of smart farming is here, and IoT is a major driving force behind this change. IoT in agriculture can optimize crop yields, reduce waste, improve animal health, and more. With this in mind, let's explore what IoT in agriculture is, its various use cases, and, most importantly, how we can ensure the security of IoT devices and data in this critical industry.
Read more»
unauthorized access nac portnox
Hackers Can Use Your Smartphone to Gain Unauthorized Network Access
The proliferation of smartphones has long been underway, giving hackers potent and growing avenue for infiltrating corporate networks: the very devices carried by employees. As the use of personal smartphones for work purposes becomes increasingly prevalent, hackers are capitalizing on this trend, exploiting vulnerabilities in mobile devices to gain unauthorized access to sensitive corporate networks.…
Read more»
mitm attack nac portnox
Fortifying Your Corporate Network Against a Man-in-the-Middle (MitM) Attack
In an era where cyber threats loom large, organizations worldwide are grappling with the need to secure their networks from sophisticated attacks. Man-in-the-Middle (MitM) attacks, in particular, pose a significant risk to corporate networks, potentially leading to devastating consequences. To combat this menace, experts are turning to network access control (NAC) solutions as a powerful…
Read more»
Automotive IoT
Automotive IoT: Use Cases & Security
The global automotive IoT market size was valued at USD 82.7 billion in 2021 but is projected to surpass around USD 621.8 billion by 2030. In other words, IoT is massively disrupting the automotive sector, and this trend will persist as automakers look for innovative ways to set themselves apart in a fiercely competitive market. Connected cars, telematics, fleet management, and autonomous vehicles are just a few examples of how IoT is revolutionizing how we drive and maintain vehicles.
Read more»
IoT device monitoring
IoT Device Monitoring: Safeguarding Your Connected World
From smart homes to industrial automation, IoT devices have become ubiquitous in our daily lives. However, as the number of devices increases, so do the security risks. Hackers are constantly finding new ways to exploit vulnerabilities and gain access to sensitive information. This is where IoT device monitoring comes in - a crucial tool for businesses to keep their networks secure and their data safe.
Read more»
gdpr compliance portnox
Strengthening Corporate Networks: Ensuring GDPR Compliance for Enhanced Cybersecurity
In today’s interconnected world, where digital transformation has become the norm, safeguarding sensitive data and protecting corporate networks against cyber threats has become a critical priority for companies across Europe. In light of the General Data Protection Regulation (GDPR), it is not only a legal requirement but also a strategic imperative for organizations to ensure…
Read more»
IoT and 5G
5G and IoT: Opportunities, Challenges, & the Road Ahead
The convergence of 5G technology and the Internet of Things (IoT) is poised to reshape the digital landscape, offering unprecedented opportunities for businesses and consumers alike. As 5G networks roll out, they will provide the necessary infrastructure for IoT devices to communicate faster and more efficiently, enabling a new era of connectivity and innovation. Moreover, the integration of 5G technology is expected to boost the development of industry 4.0, revolutionizing manufacturing processes and supply chain management through increased automation and data exchange. 
Read more»
oakland ransomware attack portnox
Unpacking the Recent Oakland Ransomware Attack
Today, we’re here to talk about the recent ransomware attack that hit Oakland, California. Now, before you start to panic, let’s break down what happened and what it means for the city. First things first: what is ransomware? Essentially, it’s a type of malware that hackers use to gain control of a computer system or…
Read more»
hipaa security standards portnox
Meeting HIPAA Security Standards with NAC
With the increasing use of electronic health records (EHRs) and other digital medical information, healthcare providers must prioritize the security of their networks to ensure the privacy of patients’ information. One way to accomplish this is through network access control (NAC), a security solution that can help healthcare providers meet HIPAA compliance requirements. HIPAA, or…
Read more»
school cyber attacks portnox
U.S. School Cyber Attacks Are On the Rise. It’s Time to Fight Back.
In recent years, U.S. school districts have increasingly become targets for cyber attacks. These school cyber attacks have ranged from ransomware attacks to data breaches, resulting in a significant loss of data and resources for school districts. The reasons for this are varied, but a common issue is the lack of proper network access controls…
Read more»