Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Blog, Cyber Attacks, Network Security, Networking, Uncategorized
When Time Stands Still: The Business & Operational Impacts of System Downtime
Despite being an issue that falls squarely in the IT domain, system downtime reverberates throughout the entire business. Yet, many firms fail to fully understand its actual cost and reach. Knowledge is power, and by better understanding the wide-ranging implications of system downtime, businesses can implement effective strategies to mitigate its impacts.
Read more» Blog, Cyber Attacks, Security Trends
Your Company’s Cyber Insurance Coverage is Making It a Target
The sharp spike in ransomware attacks has increasingly turned cybersecurity insurance coverage from an optional add-on into an essential safeguard for businesses. Yet, a dark trend is emerging: the safety net of insurance may paradoxically mark you out as prey for cybercriminals. Cyber attacks are becoming more frequent, sophisticated, and severe. According to one report,…
Read more» Cyber Attacks, Security Trends
Breaking Down Ransomware’s Preferred Pathways: Top Attack Vectors
In the rising tide of cyber threats, one word persistently echoes across corporate networks and personal devices: ransomware. This breed of malicious software employs an array of cyber attack vectors to infiltrate systems, encrypt data, and demand a ransom to restore access—a tactic proving both lucrative and devastating for those in its crosshairs. Critically, ransomware…
Read more» Blog, Cyber Attacks, Security Trends
Top 5 AI Cyber-Attacks & Threats
Artificial Intelligence (AI) has enabled impressive progress in many fields, but as our reliance on it grows, so does its abuse. As remarkable advancements like ChatGPT, Dall-E, Vall-E, and other AI models reshape our digital landscape, there’s a pressing concern—AI cyber-attacks. Cybersecurity, as we know it, is being challenged, and we need to respond effectively.…
Read more» Blog, Cyber Attacks, Network Access Control, Network Security
Stopping the WiFi Password Hacker with NAC
In the digital age, where businesses rely on seamless connectivity and data exchange, corporate WiFi networks have become the backbone of modern operations. However, a growing concern looms over these networks: the alarming ease with which their passwords can be hacked. In this article, we explore the vulnerabilities that make corporate Wi-Fi networks susceptible to…
Read more» Blog, Cyber Attacks, Network Security
Hackers Can Use Your Smartphone to Gain Unauthorized Network Access
The proliferation of smartphones has long been underway, giving hackers potent and growing avenue for infiltrating corporate networks: the very devices carried by employees. As the use of personal smartphones for work purposes becomes increasingly prevalent, hackers are capitalizing on this trend, exploiting vulnerabilities in mobile devices to gain unauthorized access to sensitive corporate networks.…
Read more» Blog, Cyber Attacks, Network Security
Fortifying Your Corporate Network Against a Man-in-the-Middle (MitM) Attack
In an era where cyber threats loom large, organizations worldwide are grappling with the need to secure their networks from sophisticated attacks. Man-in-the-Middle (MitM) attacks, in particular, pose a significant risk to corporate networks, potentially leading to devastating consequences. To combat this menace, experts are turning to network access control (NAC) solutions as a powerful…
Read more» Blog, Cyber Attacks, Network Access Control
Unpacking the Recent Oakland Ransomware Attack
Today, we’re here to talk about the recent ransomware attack that hit Oakland, California. Now, before you start to panic, let’s break down what happened and what it means for the city. First things first: what is ransomware? Essentially, it’s a type of malware that hackers use to gain control of a computer system or…
Read more» Blog, Cyber Attacks, Network Security, Zero Trust
The Real Cost of a Data Breach
Beyond the financial ramifications of a breach, it could compromise your reputation and the trust of your customers. In fact, according to Cybersecurity Ventures, 60% of small businesses go out of business within six months of a cyber attack. In addition to the financial losses, enterprises would have to contend with the cost of the following:
Read more» Blog, Cyber Attacks, Network Security
Are Passwords a Threat to Enterprise Security?
Enterprise security attackers are growing in number and sophistication. Organizations are only one password away from it being their worst day. To that point, is it time to ditch all those annoying, hackable passwords and live in a passwordless society? Passwords have been the primary method of authentication for decades. While they have served their…
Read more» Application Security, Blog, Cyber Attacks, Network Security, Security Trends
TikTok Security Concerns in the Workplace
TikTok, the viral social media app centered around short videos and owned by the Chinese company ByteDance, is coming under intense scrutiny. By now, many of us have seen a TikTok video filmed in someone’s workplace—those “day in the life” clips or rants about coworkers, supervisors, or customers. Or you may have seen a video…
Read more» Blog, Cyber Attacks, Network Security, Zero Trust
How Zero Trust Strengthens the Software Supply Chain
The escalation of digital transformation since the beginning of the pandemic has forced us to rethink cybersecurity and the software supply chain. As the global supply chain becomes more interconnected and complex, organizations are increasingly turning to third-party software supply chain providers to streamline operations, reduce costs, and offer a full stack of solutions. However,…
Read more»