What is Zero Trust Security?

Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment. An evolving landscape Historically, organisations have kept their data…

What Is Identity Governance and Administration?

Identity governance and administration (IGA) is a policy-based approach to identity management and access control. As the name implies, IGA systems merge identity governance and identity administration to provide additional functionality beyond traditional identity and access management (IAM) tools. Particularly, they offer valuable support in…

What Is Vishing?

Vishing (or “voice phishing”) is a type of social engineering scam where an attacker tries to trick their target into surrendering sensitive data over the phone.  As with other social engineering attacks, these phone phishing scams prey upon human emotions—attackers often create false scenarios that cause panic (e.g., security alerts) or desire (e…

FREE NOW: Making remote work simple and secure for 1,300 employees with Okta

Can you think of a moment before 2020 when the words “in these unprecedented times” have been more widely used? Organisations all over the world are pushing their creativity to the limit to keep “business as usual” under very unusual circumstances. The coronavirus situation has impacted companies of every size, including FREE NOW, the multiservice…

Archive

Follow Us
Share on Linkedin Share on Facebook Share on Youtube