4iQ released its COVID-19 Threat Report, which explores a host of notable scams that have surfaced during these uncertain times, including sextortion/blackmail emails, fake news, ransomware and phishing campaigns.
According to the 2020 Thales Access Management Index – U.S. and Brazil Edition1– four out of ten IT security professionals still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, even though most hacking-related breaches are a result of weak, stolen or reused user credentials.
To help agencies understand and effectively manage encryption keys, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), in collaboration with the Federal Partnership for Interoperable Communications (FPIC), developed the Encryption Key Management Fact Sheet. Public safety organizations can leverage the Fact Sheet's information and familiarize themselves with the many aspects of encryption key management.
Recently, data tokenization has proved to be a successful protection method for securing sensitive information and all instances of personal data. This is because it allows information to retain its analytical value, while ensuring that it meets regulatory requirements.
Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offers further security for those outside the corporate walls and ensures IT teams can more easily monitor and resolve any potential issues faster and easier. The workforce of tomorrow will see remote work security and cellular connectivity go hand-in-hand.