

#Iconsole training full#
Seeing that many administrators lack a full understanding of modern cyberthreats, they released a new experimental feature, Cybersecurity for IT Online, a training tool you can access directly from the same console. However, our colleagues continue to improve the solution. One of its latest feature updates is a mechanism for detecting shadow IT systems, which are the very cloud services employees use to work with corporate data without informing their IT department. At the same time, the administrator can manage the solution from a single cloud console. Because it works in the cloud and does not require additional hardware, it does not place an unnecessary load on IT resources. The Kaspersky Endpoint Security Cloud solution, which protects employee workstations, is one of the key tools in our arsenal. Gaining a deeper knowledge of today’s threat landscape and a better understanding of what is happening at employees’ remote workstations has become paramount. In many cases, they didn’t bother to seek IT specialists’ approval for the use of those applications and services, and they rarely showed much care in securing them.Īs a result, IT administrators not only had to keep an eye on a bunch of new factors in their workplaces, but they also had to think of ways to make remote work as secure as possible. Finding themselves in unfamiliar and uncomfortable environments, many took it upon themselves to search for tools to facilitate teamwork. That happened primarily because all sorts of attackers became active, sending phishing messages and carrying out BEC attacks on employees working from home, although attempts to brute-force remote access tools have seen explosive growth as well.Įmployees have complicated the situation. The task of making remote work convenient for workers was foisted on IT departments, and in most cases they have been able to cope with the challenge, providing access to corporate information systems, setting up new services, and helping employees troubleshoot any difficulties that arose.īut within just a few weeks, it became clear to many that new processes required new security mechanisms. The best person to explain what has changed since the beginning of social isolation and stay-at-home orders is your own IT administrator. Both approaches have merit, but the second is where we can help you out. Management faces a choice: Hire an additional information security specialist or provide specialist advanced training to existing IT staff. Even small firms have realized that the skills of their IT administrators are no longer sufficient to ensure business continuity and protect corporate information. The pandemic, which has led to a widespread shift to remote working, has also highlighted the need to change security strategies at many companies. The notable shortage of cybersecurity specialists on the market in recent years has become particularly problematic in 2020.
