What do Remote Businesses need to Survive? – The Radical Increase of Digital Adoption
Duo, a leading provider of multi-factor authentication and secure access solutions has published a new report. The report highlights the unprecedented IT changes that organisations underwent in 2020 as a result of the massive shift to remote work, and the accelerated adoption of cloud computing technology.
The 2020 Report shows how organisations rapidly transitioned to remote access technologies such as VPN (Virtual Private Network) and RDP (Remote Desktop Protocol), causing authentication activity to these technologies to increase by 60%, and the adoption of Cloud Computing solutions to increase, with daily authentications to cloud applications rising by 40%.
As a result of this change, their monthly authentications increased from 600 million to 900 million per month. The report also highlights the challenges posed by employees using personal or unmanaged devices, in March this led to a 90% increase in blocked access attempts due to outdated devices. The report concludes that organisations must now implement a modern and mature security approach that accounts for the traditional corporate security perimeter that has been completely upended.
If your business has made the move to remote or hybrid working, it is worth looking into your current security policies and processes to analyse the capabilities of your infrastructure, including; phone/mobile solutions, home-worker broadband, and much more. One2Call, can provide security packages to suit your specific needs, so that your business and its employees can operate effectively even though their physical environment has changed. Find out more about our security solutions.
Latest News Stories
TikTok Banned on Government Devices amid Security Concerns
Today the UK Government has announced that, on security grounds, the Chinese-owned social media app TikTok will be banned on devices utilised by civil servants and government ministers, taking immediate action. Cabinet Office Minister, Oliver Dowden, released a...
The Problems with Passwords, Transitioning to Passwordless Logons
Single password-based authentication has become outdated in the digital era due to powerful machines becoming more efficient at cracking (or brute forcing) passwords, amplifying weakness made by users creating predictable passwords that are easy to guess. With...
Failing to Patch Vulnerabilities can lead you Open to Attack
Software vulnerabilities are weaknesses in computer programs that are exploited by cyber attackers to gain unauthorised access to systems. Attackers can take advantage of these vulnerabilities to run malicious codes, bypass security measures, and access sensitive...
Our Customers
Testimonials
Tracy Lilley, Ecclesfield Primary School
Responsive, friendly service. Very customer focused, polite and eager to help. Would definitely recommend and will use again.
Jane, Barca Leeds
Very quick at responding to problems – keep you updated – easy to deal with – very happy with the service !
Pat Nash, Invma
Responsive support, friendly service, knowledgeable/competent engineers.