by Liquid Video Technologies | May 14, 2021 | Access Control, Cybersecurity, Data Breaches, Security
Google collects a lot of data about you if you use the company’s services. To its credit, the company makes finding and deleting that data easy by showing most of it on a single website. Here’s how to see the bulk of what Google knows about you, and how to delete it...
by Liquid Video Technologies | Apr 2, 2021 | Access Control, Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Cybersecurity researchers on Sunday disclosed multiple critical vulnerabilities in remote student monitoring software Netop Vision Pro that a malicious attacker could abuse to execute arbitrary code and take over Windows computers. “These findings allow for...
by Liquid Video Technologies | Dec 30, 2020 | Access Control, Cybersecurity, Security, Uncategorized
Enterprises are grappling with increased complexity as cloud adoption increases, the perimeter expands, and digital transformation projects take hold. The accelerated shift to remote working has only added to the complexity. As more businesses leverage hybrid IT...
by Liquid Video Technologies | Dec 21, 2020 | Access Control, Cybersecurity, Security
Safeguarding an organization from cybercrime has become vastly more challenging given how digitized and, as a result, interconnected the world has become. Adding complexity to this already daunting scenario is the fact organizations have become perimeter-less, often...
by Liquid Video Technologies | Nov 25, 2020 | Access Control, News, Security
As a cloud-based visitor management provider for enterprise companies worldwide, my team and I have always been vigilant in keeping the lines of communication open with our clients. This is especially true since March 11, 2020, when the World Health Organization (WHO)...
by Liquid Video Technologies | Nov 4, 2020 | Access Control, Cybersecurity, Monitoring, Network Security, Security, Security Breach, zero trust
Zero Trust Networks While the concept of Zero Trust was created 10 years ago, the events of 2020 have thrust it to the top of enterprise security agendas. The COVID-19 pandemic has driven mass remote working, which means that organizations’ traditional perimeter-based...
Recent Comments