by Ashur Kanoon | Mar 22, 2023 | Blog
Last year in 2022, there were 1,802 data compromises affecting more than 422 million people – but the LastPass data breach is the one that has security practitioners chatting. The original incident happened in August of 2022. Initially, we were told it was a “minor”...
by Ashur Kanoon | Feb 28, 2023 | Blog, Improved User Experience
The idea of customer self-service has been around since 1833 when Percival Everett’s first self-service vending machines appeared in London, selling postcards. But when it comes to IT, many organizations find self-service daunting (though they agree it can be a path...
by Ashur Kanoon | Feb 16, 2023 | Blog, Use cases
Protecting users against malicious sites and enabling acceptable use policy (AUP) may be accomplished using some basic tools, however, modern organizations don’t have the resources or time to discover, track, and analyze millions of domains. Banyan Security’s Internet...
by Ashur Kanoon | Feb 14, 2023 | Blog
So you’re in charge of your organization’s DNS and hybrid access, and part of the job is providing DNS records to make systems easily accessible but you also need to make sure that you’re preventing spoofed domains, which can lead to a security breach. The first...
by Ashur Kanoon | Feb 7, 2023 | Blog, Improving Legacy Technology
With IPSec, SSL, TLS, VPN, SDP, and ZTNA tunnels, it may sometimes become confusing to figure when to use which. IPSec was mostly used for site-to-site VPN and we’re going to focus on remote access. Clearly, there are different types of tunnels and different ways...
by Ashur Kanoon | Jan 24, 2023 | Blog
The negative effects of checking for user credentials at the beginning of a session and granting hours-long access have surfaced many issues, sometimes leading to major security incidents, for users and organizations alike. Continuously checking is an option but not...
by Ashur Kanoon | Jan 3, 2023 | Blog
As a frequent contributor and daily reader of r/VPN on Reddit, I see a lot of consumer VPN questions for vendors like NordVPN, ExpressVPN, OpenVPN, and Private Internet Access (PIA). Let’s look at a few use cases for these and a few things to consider when looking for...
by Ashur Kanoon | Dec 20, 2022 | Blog, Use cases
Authentication and authorization can and should be based on many factors. Relying solely on a username or group leaves a lot to be desired, especially when thinking about how to continuously layer on checks and balances to increase security. User and Entity Behavior...
by Ashur Kanoon | Dec 15, 2022 | Blog, How-To, Use cases
With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With over $9B spent on Black Friday itself, you can pretty much guarantee some of your...
by Ashur Kanoon | Dec 13, 2022 | Blog, Improving Legacy Technology
The more prospects I talk to, the more I hear about the dreaded SaaS downtime. Downtime isn’t just an inconvenience. Organizations count on SaaS vendors to ensure certain levels of uptime, so that the organizations themselves can continue to run their business. So,...
by Ashur Kanoon | Dec 8, 2022 | Blog, How-To, Improving Legacy Technology
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to a Windows-based computer over a network connection. The user employs RDP client software for this purpose, while the other...
by Ashur Kanoon | Nov 29, 2022 | Blog, How-To
It’s been almost 3 years since the world changed and everyone learned what a pandemic is. Students were told to stay home, and school district IT teams were trying to figure out how to get everyone together so that learning continued. With kids at home, working...