September 8, 2020 •
As we refine our remote work arrangements, our arsenal of communication devices—and our digital footprint—grows. Unfortunately, all these communication tools create additional IT vulnerabilities and make our businesses a more prominent target for cyber attackers to exploit. In this post I’ll share common ways in which an attacker bypasses network, software and physical controls in today’s extended workplace environment.