Paul-Fisher-and-Anil-Bhandari-shares-key-insights-ARCON Blog

The meticulous IT practices amid emerging challenges from remote workforce

The sudden ‘new normal’ emerging for global organizations due to the pandemic and resulting remote work culture has increased IT security concerns, especially malicious insider threats. Inadequate transition time for adapting to the changes and insufficient IT security safeguards have made global organizations more vulnerable to insider threats and cyberattacks.

Still, implementing best practices can help ward-off IT threats emanating from the misuse of digital identities and credentials. So we thought to disseminate information around that. The stage was set. ARCON being the pioneer in Information Security solutions partnered with KuppingerCole, one of the leading Identity and Access Control advisors and consultants in the world to host a webinar.

Read More

What’s so common between the kingdoms and IT ecosystems?

Do you remember the infamous historical character from the battle of Plassey? The chief commander of the Nawab of an East Indian province became an embodiment of betrayal after the historic loss in the battle. The culprit misused the blind trust and faith that his nawab kept on him and eventually allowed the British troops to conquer the land. Who knows if the Nawab would have verified this trustworthiness, maybe the history would have been different? Trust, once lost, can never be retrieved – similarly, the loss which incurs from a mistrust is rarely recovered.

 

What is the moral of the story?… never assume the ‘trust’ but always reassess it.

Read More

Why is it crucial to segment privileged identities?

Overview
Can we think of an organization that does not have any segmentation of departments like marketing, finance, HR & Administration? The answer is probably NO – even if there is, the organization can never ensure systematic day to day activities. We don’t need to explain the importance of segregating the employees in various departments as per their roles. Similarly, an enterprise IT ecosystem requires a proper segmentation of a set of digital identities. It ensures role-based access to devices and target systems by authorized users assigned for a defined task.

Read More