What do Remote Businesses need to Survive? – The Radical Increase of Digital Adoption
Duo, a leading provider of multi-factor authentication and secure access solutions has published a new report. The report highlights the unprecedented IT changes that organisations underwent in 2020 as a result of the massive shift to remote work, and the accelerated adoption of cloud computing technology.
The 2020 Report shows how organisations rapidly transitioned to remote access technologies such as VPN (Virtual Private Network) and RDP (Remote Desktop Protocol), causing authentication activity to these technologies to increase by 60%, and the adoption of Cloud Computing solutions to increase, with daily authentications to cloud applications rising by 40%.
As a result of this change, their monthly authentications increased from 600 million to 900 million per month. The report also highlights the challenges posed by employees using personal or unmanaged devices, in March this led to a 90% increase in blocked access attempts due to outdated devices. The report concludes that organisations must now implement a modern and mature security approach that accounts for the traditional corporate security perimeter that has been completely upended.
If your business has made the move to remote or hybrid working, it is worth looking into your current security policies and processes to analyse the capabilities of your infrastructure, including; phone/mobile solutions, home-worker broadband, and much more. One2Call, can provide security packages to suit your specific needs, so that your business and its employees can operate effectively even though their physical environment has changed. Find out more about our security solutions.
Latest News Stories
UPDATED June 26th, 2023: University of Manchester Targeted in Major Cyber Security Incident
Updated 26/06/2023: After Students and Saff of The University of Manchester received emails last week claiming to be from the attackers, stating that more than 7 Terabytes of data had been stolen in the attack, the university released a statement on Friday (June 23rd)...
Why should you outsource your Network Cyber Security?
The strength of your network's security is the key determinant in the aftermath of a cyber attack. Establishing a solid cyber security solution is a complex task, requiring a high level of technical skills and resources. Your Cyber Security Solution has the vital role...
Rise of Supply Chain Cyber Attacks: Understanding and Preventing the Threat
As the digital landscape evolves, so too do the threats that loom within it. Cyber Security measures are ever-improving, but in the cat-and-mouse game of the online world, hackers often still manage to gain the upper hand. The latest strategy in their arsenal? Supply...
Our Customers
Testimonials
Mark Hamilton, Gooding Group
Good communicative engineer worked away discreetly and kept me informed of progress.
Julia Wallace-Ross, Cornerstones Education
So grateful for Jordan coming out so quickly and helping me out.
Rob Watt, Straaltechniek
Quick and easy. Pawel always great to deal with.