Remove Malware Remove Strategy Remove Video Remove VOIP
article thumbnail

Busting 5 Common Myths About Vulnerability Assessment

Tenable

Video conferencing and VoIP solutions that became must-haves for remote-operating organizations (as necessitated by the COVID-19 pandemic) were common attack vectors during 2020. Patch management (PM) is a valuable part of any cybersecurity strategy – one of the ways in which many garden-variety vulnerabilities are dealt with.

SMB 101
article thumbnail

IoT Security Concerns - How Secure Is the Hybrid Workforce?

Palo Alto Networks

Earlier this year, a cloud-based security camera service company suffered a major security breach that left sensitive and private video surveillance footage from its customers publicly exposed, allowing perpetrators to go as far as pivoting into corporate networks of some customer accounts.

IoT 68
article thumbnail

Hyper-segmentation – How to Avoid Cyber Disasters

CTOvision

Many experts feel that micro-segmentation is a new strategy we should employ. After spinning off from Lucent Technologies and AT&T, Avaya became the experts in SIP, Internet telephony, unified communications and collaboration (UCC) and all thing VOIP. Now Avaya has taken this strategy to the next level by segmenting every endpoint.

How To 118