itb-au logo
Story image

Webinar: How IAM counters the complex threat landscape

13 Aug 2020

By now, organisations will be familiar with the benefits and challenges of remote working – and it’s important to recognise that wide-scale remote working isn’t just a temporary trend caused by the last few months of pandemics – in fact, it’s here to stay as one of the new ways of business life.

IT teams may have initially struggled with managing multiple devices, networks, locations, and access requirements to critical applications – but this is the time to hammer out long-term strategies to manage IT in this new world.

Remote working also present security concerns – this has not gone unnoticed by cybercriminals. According to LastPass by LogMeIn, the number of phishing websites have grown 350% since the start of 2020.

In Australia, Scamwatch reports an 18% increase in the number of criminals who have tried to steal personal credentials through methods such as email, phone, and text messages.

As criminals scale up their attacks, organisations also need to scale up their defences.

In this on-demand webinar, join experts from LogMeIn and the security industry on a journey into best security practices for today’s most pressing problems

In Cyber hygiene in the workplace: How IAM counters complex threat landscape, the experts will discuss how identity access management (IAM) and cyber hygiene best practice can help organisations fight back against escalating cybercrime activities; and save companies both time and money, while reducing risk.

Join this webinar and learn:

●    Why good cyber hygiene ‘routines and practices’ are so vital in today’s workplaces;
●    Why IAM countermeasures matter - and increasingly used as part of the cyber hygiene approach and cybersecurity strategies; and
●    How IAM automates critical aspects of managing identities, authentication, and authorisation - saving IT departments time and money and reducing risk to the business.

Access the on-demand recording now.

Story image
Why tool consolidation should be a top priority for businesses
How can businesses expect to scale for their biggest day when a single, unified view of their infrastructure doesn’t exist? The impact on the business is too high to ignore, writes New Relic APJ executive vice-president and general manager Dmitri Chen.More
Link image
Revealed: How to streamline the payroll process
Here are five top tips that can help you regain control of your day, cut down on errors, and take care of employees, the company, and yourself.More
Story image
Voice phishing attacks on the rise, remote workers vulnerable
There is an increase in voice phishing attacks, where hackers use existing employee names in attempt to trick victims into sharing login credentials and data by phone.More
Story image
Snowflake announces updates geared towards data mobilisation
"The new features announced today are another example of Snowflake's commitment to delivering the technology customers need to fully mobilise their data and achieve meaningful business value.”More
Story image
GitHub shares 'greatest hits' open source repositories with historic libraries
Barely 12 months after launching an initiative to preserve open source software for future generations, GitHub is now sharing these collections with major libraries around the world.More
Story image
Palo Alto Networks launches enterprise data loss prevention service
"As a single centralised cloud service, Palo Alto Networks Enterprise DLP can be deployed across an entire large enterprise in minutes with no need for additional infrastructure."More