
Sign up to save your podcasts
Or
It's been nearly a decade since the famed story of a Verizon employee who leveraged a VPN to outsource his job to privately hire workers in China. In 2013, remote employees accessing company networks was a less frequent occurrence than it is now. But today, studies are projecting that by 2025, 36M American employees will work remotely.
HR professionals and business leaders are welcoming a newer, more flexible age of working arrangements to accommodate digital nomads, work-from-home offices, and in some cases, a partial return to the office or hybrid work.
Meanwhile, cybersecurity professionals tasked with managing now ever-expanding digital boundaries of the organization face exponentially increasing threats. All while managing users accessing companies' systems and sensitive data during the once-in-a-career jump to WFH catalyzed by the pandemic has become a new standard working protocol that adds layers of complexity to access control and authentication measures.
In this new cybersecurity best practices discussion, Jonathan Tomek provides background knowledge on the importance of applying threat intelligence protocols to track, identify and analyze IP address data to ensure safe work environments, regardless of how they are accessed.
5
198198 ratings
It's been nearly a decade since the famed story of a Verizon employee who leveraged a VPN to outsource his job to privately hire workers in China. In 2013, remote employees accessing company networks was a less frequent occurrence than it is now. But today, studies are projecting that by 2025, 36M American employees will work remotely.
HR professionals and business leaders are welcoming a newer, more flexible age of working arrangements to accommodate digital nomads, work-from-home offices, and in some cases, a partial return to the office or hybrid work.
Meanwhile, cybersecurity professionals tasked with managing now ever-expanding digital boundaries of the organization face exponentially increasing threats. All while managing users accessing companies' systems and sensitive data during the once-in-a-career jump to WFH catalyzed by the pandemic has become a new standard working protocol that adds layers of complexity to access control and authentication measures.
In this new cybersecurity best practices discussion, Jonathan Tomek provides background knowledge on the importance of applying threat intelligence protocols to track, identify and analyze IP address data to ensure safe work environments, regardless of how they are accessed.
1,647 Listeners
1,273 Listeners
1,030 Listeners
517 Listeners
621 Listeners
175 Listeners
201 Listeners
2,315 Listeners
297 Listeners
322 Listeners
267 Listeners
192 Listeners
5,312 Listeners
346 Listeners
141 Listeners