Gareth Dalton explains his work to protect firms from cyber breaches
The covid-19 pandemic saw a significant increase in the adoption of remote working, with employers offering the tools required to facilitate this shift in working practice. More and more businesses now see the agile advantages of running their platforms within a hosted or cloud environment, with users able to access information and data from the majority of internet-connected devices, such as laptops, tablets and smartphones.
Whilst having on-premises infrastructure by no means guarantees a secure environment (far from it in fact), how do you ensure all your users who connect remotely, are bona fide users, and not someone who has hacked a compromised account?
With data breaches and compromised user credentials ste...