Protect Your Organization’s Computers Even If A Bad Actor Hacks Your Phone System or Smart Devices
Businesses sometimes have air conditioning systems, light controllers, music, VoIP phones, and similar devices connected to their network. If an attacker successfully breaks into any of those devices, the attacker can use them as a platform to launch attacks against...
Protect Against Work From Home Computer Attacks Compromising your Primary Network
Tell your IT provider, or internal IT team, that you want them to isolate or filter the VPN connections. At least discuss this security step with them. If any users connect via VPN to your office, be sure your IT team isolates or filters the data that travels from the...