What do Remote Businesses need to Survive? – The Radical Increase of Digital Adoption
Duo, a leading provider of multi-factor authentication and secure access solutions has published a new report. The report highlights the unprecedented IT changes that organisations underwent in 2020 as a result of the massive shift to remote work, and the accelerated adoption of cloud computing technology.
The 2020 Report shows how organisations rapidly transitioned to remote access technologies such as VPN (Virtual Private Network) and RDP (Remote Desktop Protocol), causing authentication activity to these technologies to increase by 60%, and the adoption of Cloud Computing solutions to increase, with daily authentications to cloud applications rising by 40%.
As a result of this change, their monthly authentications increased from 600 million to 900 million per month. The report also highlights the challenges posed by employees using personal or unmanaged devices, in March this led to a 90% increase in blocked access attempts due to outdated devices. The report concludes that organisations must now implement a modern and mature security approach that accounts for the traditional corporate security perimeter that has been completely upended.
If your business has made the move to remote or hybrid working, it is worth looking into your current security policies and processes to analyse the capabilities of your infrastructure, including; phone/mobile solutions, home-worker broadband, and much more. One2Call, can provide security packages to suit your specific needs, so that your business and its employees can operate effectively even though their physical environment has changed. Find out more about our security solutions.
Latest News Stories
How ITDR can help protect you from the latest Cyber Security Threats
Attacks targeting the identity layer have become a prominent cyber security threat, as attackers adapt to the consolidated corporate IT world of Access Management. Duo's algorithm research team aligns with Gartner's Identity Threat Detection and Response (ITDR) to...
Protect yourself from Stealthy Cyber Attacks
State-sponsored hackers from China have developed sophisticated techniques that allow them to infiltrate government and business networks and spy on victims for long periods without being detected by common cybersecurity tools, according to researchers at Google's...
Charities are being targeted with Phishing and Ransomware Attacks
A recent threat report released in January 2023 highlights the susceptibility of the charity sector to cyber attacks, the tactics employed by cyber criminals, and the optimal strategies for charities to safeguard themselves. The ramifications of cyber attacks on...
Our Customers
Testimonials
Steve Garbett, Jaxson Wolf
Very helpful, good staff. they do what they say they can do and on time. they also go the extra mile for the customer which is very refreshing.
Mick, MS International
Easy to get hold of and down to earth.
LFP Financial Planning
Excellent speedy service! Thank you for your help.