2139: Cybersecurity Best Practices for Analyzing Who’s Behind the Sign-on - a podcast by Neil C. Hughes

from 2022-10-13T00:00

:: ::

It's been nearly a decade since the famed story of a Verizon employee who leveraged a VPN to outsource his job to privately hire workers in China. In 2013, remote employees accessing company networks was a less frequent occurrence than it is now. But today, studies are projecting that by 2025, 36M American employees will work remotely.

HR professionals and business leaders are welcoming a newer, more flexible age of working arrangements to accommodate digital nomads, work-from-home offices, and in some cases, a partial return to the office or hybrid work.

Meanwhile, cybersecurity professionals tasked with managing now ever-expanding digital boundaries of the organization face exponentially increasing threats. All while managing users accessing companies' systems and sensitive data during the once-in-a-career jump to WFH catalyzed by the pandemic has become a new standard working protocol that adds layers of complexity to access control and authentication measures.

In this new cybersecurity best practices discussion, Jonathan Tomek provides background knowledge on the importance of applying threat intelligence protocols to track, identify and analyze IP address data to ensure safe work environments, regardless of how they are accessed.

Further episodes of The Tech Talks Daily Podcast

Further podcasts by Neil C. Hughes

Website of Neil C. Hughes