Search

Service

Virtual Learning

Training teams across geographies can be disruptive and difficult to coordinate. Focal Point Academy offers live virtual training, providing all the benefits of live instruction without the headaches and cost of team travel.
Insight

3 Key Risks Threatening Cloud Security in 2020

For years now, organizations have resisted moving key enterprise systems to the cloud because of their concerns around cloud security. However, the idea that cloud offerings like IaaS, SaaS, and PaaS lack strong security controls is myth. In fact, Gartner posits that public cloud service providers (CSPs) are even more secure than traditional in-house implementations. Instead of tailoring their products to organizational structures, applications, policies, and politics, cloud products are designed to meet rigorous security standards like ISO 27001, SOC 2, and FedRAMP. But while these products are often built with strong security controls, human configuration of these tools still creates risk. Gartner estimates that 99% of cloud security failures through 2025 will be customers’ fault. Customizing cloud systems and applications – a necessary step for many integrations – alters the security of the product, exposing organizations to new risks, if not managed properly. The first step in assessing and managing cloud security is evaluating the tools (e.g., automation scripts, APIs, third parties, VPCs) that are used to generate and provide cloud resources to your users. In this post, we’ll look at the three most critical cloud security risks facing businesses today and how to address them.
Insight

Your Toolkit for Securing Remote Access

Guides, checklists, and tips for securing and enabling your remote workforce during global disruption
Insight

Upgrading to S/4 HANA with a Security and Compliance Focus

Learn the most important security, compliance, and GRC considerations BEFORE making the upgrade to SAP S/4 HANA
Insight

An Internal Auditor’s Guide to Data Privacy

Practical strategies for addressing privacy risk designed for internal audit teams
News Article

Focal Point Academy Brings Elite Cyber Training to Remote Workforces

Focal Point Academy's most popular cybersecurity training courses are now available for virtual delivery via fully remote, live instruction, providing more interactivity and time spent in hands-on labs.
Insight

7 Tips for Securing Your Privacy on Video Conferencing Platforms

Note: In late May, Zoom released version 5.0 of its videoconferencing platform, which addresses a number of security and privacy concerns. A list of these updates can be found here: https://zoom.us/docs/en-us/zoom-v5-0.html. The Covid-19 pandemic has restricted the movement of millions of people, and many companies have transitioned to remote workforces, schools have moved to virtual learning, and restaurants and stores have switched to delivery. These events are driving the demand for video conferencing, online collaboration, and chat systems to carry out business. One web conferencing platform that has recently exploded in popularity is Zoom, which provides a free video calling experience. In just a few short months, Zoom grew by 2000%, supporting over 200 million users. Unprepared for the surge and catapulted into the limelight, Zoom has been highly criticized over its inadequate privacy and security practices, particularly on its free version, which have revealed unprotected user account data, in-app surveillance measures, the selling of user data, video hijacking, incomplete end-to-end encryption, and a misleading privacy policy. While Zoom has taken responsibility for its flaws and is trying to retroactively correct these issues, there are additional steps that you should take to protect your privacy and ensure your meetings are safe from intruders, regardless of whether you’re using Zoom or another video conferencing tool.
Insight

Protecting Your Office Away from the Office

How organizations can secure remote access for employees and third parties
Insight

You Rolled Out VPN and MFA: Now What?

How to build a phased approach to remote access and streamline your MFA implementation.
New Search