This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Coronavirus Coverage » Coronavirus and Telecommuting Employees

Coronavirus and Telecommuting Employees
Coronavirus and Telecommuting Employees RSS Feed RSS

cyber freepik

Is the World Economic Forum's prediction of a global cybersecurity failure in the next 10 years avoidable?

Shira Rubinoff
March 11, 2021
The World Economic Forum's Global Risk Report for 2021 placed cybersecurity failure among the greatest threats facing humanity within the next ten years. Clearly, in this climate, and since many jumped into the world of cyber operations without adequate preparation, cybersecurity is now a critical priority.
Read More
5 mins with Borromeo

5 minutes with Michael Borromeo – Cybersecurity best practices with a hybrid workforce

Maria Henriquez
March 10, 2021
Hybrid work is emerging as a norm, especially for companies who have a mix of workers whose job requires coming into the office, and those who are able to accomplish their work at home. This hybrid workforce is expected to become more prevalent as 75% of workers want to retain flexibility over their schedule beyond the pandemic. To get some insight into how security executives executives can implement consistent security practices for the new hybrid workforce environment, we spoke to Michael Borromeo, Vice President, Data Protection at Stericycle, the provider of Shred-it information security services.
Read More
computer

Reshaping cybersecurity in the Remote Work Era

John Ayers
February 22, 2021

2020 and COVID-19 taught us a few things in the security industry: the importance of security awareness, speed of deployment is not always a good thing, and assuming new levels of risk such as “remote work force”. With so many challenges still on the horizon, here are some of the key topics to have on top of mind:


Read More
cameras surveillance

Cloud-based solutions playing crucial role in current and future of commercial security space

Kim hartman
Kim Hartman
February 19, 2021
An example of how businesses are benefitting from integrated cloud-based systems would be in the retail industry. Retail end users have integrated their security camera network, heat-mapping and video analytics technology with a cloud-based system so they can remotely monitor who is in their store. The heat-mapping and analytics technology also showcases where customers are spending the most time in their store, providing retailers with insight as to where they can place specific item displays or promotional items. This information can also be used to inform on if a specific location in a store needs additional signage to encourage social distancing, or even if it needs increased camera coverage within a store. The practical applications of integrated cloud-based systems and other security technology are nearly endless.
Read More
virtual meeting

What does your virtual meeting background say about you?

Tl jennifer bazela detail
Jennifer Bazela
February 17, 2021

Virtual platforms are a great tool to bring people together. And at least initially, virtual backgrounds were fun. Many of us used virtual backgrounds to redecorate our homes, try out new styles and show off some of our personal interests. But the trend now seems to be shifting. My experience is that people are now increasingly using real backgrounds for virtual meetings.  Both virtual and actual backgrounds are acceptable during online meetings. However, there are at least four important things that work-from-home warriors should consider when choosing to share their real backgrounds given that many of us are still working from home offices.


Read More
budget

A post-pandemic guide to cybersecurity budgeting for 2021

Bernie brode
Bernard Brode
February 3, 2021
While it might not feel like it right now, the kind of root-and-branch assessment of cybersecurity budgets necessitated by the pandemic might, overall, be a positive development. Many firms haven't looked at their budgets and the assumptions they are based on for many years. This review has been long overdue.
Read More
computer

Ushering in cybersecurity’s new era with zero trust 2.0

Amir Nooriala
January 21, 2021
Just as you would imagine based on its name, Zero Trust requires authentication of each touchpoint connecting to an organization’s network, aiming to transform it into an impenetrable fortress. Regardless of its benefits, even Zero Trust has its limitations and can create friction unnecessarily, which could have a lasting effect on employee productivity and an overextension of security resources. Are there any alternatives? Is there another remedy that can provide a similar level of security as Zero Trust without the friction? Zero Trust 2.0 is the answer.
Read More
data privacy

5 security predictions for 2021

Karen walsh
Karen Walsh
January 8, 2021

Many organizations are planning to continue with remote work until at least late spring 2021 while others will continue to migrate to a distributed workforce as part of their long-term business plans. With all of this in mind, a quick look at the cybersecurity, privacy, and compliance Magic 8 Ball indicates that “all signs point to yes” for continued attacks and digital transformation.


Read More
data-center

People, processes, and tech: 2021’s top cybersecurity priorities

Rob scott
Rob Scott
January 7, 2021

While the rough seas may be behind businesses, now is not the time to rest. It’s important for security leaders to remain diligent about their company’s security posture and adapt to the latest state of the world. Focusing on people, processes, and technology is not only the foundation to a solid cybersecurity strategy, but also absolutely critical at a time where workers have never been further from security teams’ protection.


Read More
cyber_lock

Companies need to enhance cybersecurity amid the continuation of COVID-19 in 2021

Bob ackerman
Robert R. Ackerman Jr.
January 7, 2021

Is your company’s cybersecurity policy as effective as it should be amid these tumultuous times? And if you’re not an employee but the owner of a small business – typically someone with much less sophisticated cybersecurity protection – how does your online security stack up? The answer: Cybersecurity has improved, but markedly more has to be done to secure networks in 2021, the second year of the pandemic, as the number of cyberattacks has become staggering.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 16 17 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

police-alert-freepik1170x658v5.jpg

DHS issues national terrorism alert

ransomware-freepik1170x658.jpg

University of Pisa suffers ransomware attack

phishing-security-freepik1170x658v4.jpg

Phishing at all-time high; 1 million attacks in Q1 2022

threat monitoring social media

Threat monitoring with social media

cyber security map

4 questions for enacting an evidence-based cybersecurity strategy

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
July 13, 2022

Making Resilience Decisions Post Pandemic

After surviving the pandemic and moving to a hybrid/remote work model, you may be feeling confident in your operational resilience. 

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

SEC shooter detection webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing