ElevenPaths Radio #4 - Secure Homeworking
Cyber Security News


March 25, 2020
9:53
It is increasingly common to see companies that offer their workers the possibility of working from home, combining it with work from the office. Or even companies born with that system and only offer the option of homeworking to their employees.
Unfortunately, during these weeks in which the coronavirus dominates practically all aspects of our daily lives, many companies have been forced to leave their offices. This has a number of security implications that must be taken into account, both for companies and employees. It is very important to ensure that the handling of connections, backups and data from home does not generate information leaks or allow phishing attacks. For this reason, in this episode of ElevenPaths Radio our CSA Diego Espitia reviews several events in which these measures were not taken into account and what consequences it caused to employees and companies.
ElevenPaths Radio
ElevenPaths Radio #4 - Secure Homeworking
LISTEN TO OUR PODCAST #ELEVENPATHSRADIO
ElevenPaths #7 - The Path after a Security Analysis
: How is a company's path after a security analysis? It is becoming increasingly common for companies of all sizes to decide to carry out a security analysis, but what steps should be taken next?
In practice, things develop as follows: a company hires a security analysis in which, through various tests, a team of professionals discovers certain vulnerabilities and their impact. After this discovery, the company asks itself what is the roadmap to follow: do I generate an action plan with responsibilities, which vulnerabilities do I solve first, do we implement compensatory controls, is it necessary to invest in training, infrastructure, solutions...?
In this new chapter of our podcast on "News with our CSAs" we review these and many other questions that arise in companies after conducting analysis or security audits with our CSA Deepak Daswani, a professional with extensive experience in this field.
ElevenPaths Radio #6 - Securing the Supply Chain
All companies in the world have a chain of suppliers, which increasingly require them to connect to their services and networks. However, the lack of controls on suppliers can lead to very critical risks to information security. In this chapter of "Cyber Security News with our CSAs", Claudio Caracciolo presents several publicly known cases where, after the analysis of large incidents, it was found that it was the exploitation of security breaches in suppliers that allowed attackers to put information at risk.