What do Remote Businesses need to Survive? – The Radical Increase of Digital Adoption
Duo, a leading provider of multi-factor authentication and secure access solutions has published a new report. The report highlights the unprecedented IT changes that organisations underwent in 2020 as a result of the massive shift to remote work, and the accelerated adoption of cloud computing technology.
The 2020 Report shows how organisations rapidly transitioned to remote access technologies such as VPN (Virtual Private Network) and RDP (Remote Desktop Protocol), causing authentication activity to these technologies to increase by 60%, and the adoption of Cloud Computing solutions to increase, with daily authentications to cloud applications rising by 40%.
As a result of this change, their monthly authentications increased from 600 million to 900 million per month. The report also highlights the challenges posed by employees using personal or unmanaged devices, in March this led to a 90% increase in blocked access attempts due to outdated devices. The report concludes that organisations must now implement a modern and mature security approach that accounts for the traditional corporate security perimeter that has been completely upended.
If your business has made the move to remote or hybrid working, it is worth looking into your current security policies and processes to analyse the capabilities of your infrastructure, including; phone/mobile solutions, home-worker broadband, and much more. One2Call, can provide security packages to suit your specific needs, so that your business and its employees can operate effectively even though their physical environment has changed. Find out more about our security solutions.
Latest News Stories
The Problems with Passwords, Transitioning to Passwordless Logons
Single password-based authentication has become outdated in the digital era due to powerful machines becoming more efficient at cracking (or brute forcing) passwords, amplifying weakness made by users creating predictable passwords that are easy to guess. With...
Failing to Patch Vulnerabilities can lead you Open to Attack
Software vulnerabilities are weaknesses in computer programs that are exploited by cyber attackers to gain unauthorised access to systems. Attackers can take advantage of these vulnerabilities to run malicious codes, bypass security measures, and access sensitive...
OpenSSL releases update to address Vulnerabilities
The OpenSSL project has released version 3.0.7, a security update for two vulnerabilities in OpenSSL 3.0.x. These vulnerabilities, CVE-2022-3786 and CVE-2022-3602, affect version 3.0.x and do not impact OpenSSL 1.1.1 or LibreSSL. Organizations are urged to ensure that...
Our Customers
Testimonials
Annette, Logo Leisurewear
Happy with excellent service by Pawel and Adam getting my new PC just as I need it to be set up. Thanks.
Rachel Warne, Bank View Farm
Professional, friendly, don’t blind you with technical jargon, get things sorted quickly.
Annette, Blastcom
Ryan was very helpful and sorted out the problem for me.