Hi [[ session.user.profile.firstName ]]

Duo Security

  • Date
  • Rating
  • Views
  • 3 Critical Protections for your Microsoft Cloud Migration 3 Critical Protections for your Microsoft Cloud Migration Ruoting Sun, Product Marketing Manager, Duo Security Recorded: Oct 19 2016 59 mins
    As organizations migrate to cloud-based Microsoft services like Office 365, many are concerned that traditional on-premises security infrastructures are now inadequate. The most common workloads requiring this new security approach as they move to public cloud platforms are email, Windows Desktop, and directory services.

    In this webinar, you’ll learn 3 critical protections for securing your move to the Microsoft cloud:

    •Security for Exchange and Office 365 email environments, local and remote Windows desktop logon
    •Insight around endpoints and device health accessing your Microsoft apps and services
    •Integration with on-premises and Azure Active Directory for role-based access policies
  • Why Healthcare Data is One of the Easiest Targets for Hackers Why Healthcare Data is One of the Easiest Targets for Hackers Mike Hanley Program Manager for Research and Development at Duo Labs & Steve Won, Product Manager at Duo Security Recorded: Sep 20 2016 33 mins
    The Duo Labs research team has pinpointed some of the most significant reasons that medical records are among the easiest of any type of data to steal. For example, Duo Labs found that 76 percent of healthcare customers are running Windows 7, with 500+ known vulnerabilities to exploit.

    It only takes one outdated device for a hacker to exploit a known vulnerability. The real-world implication? A hacker gains access to patient records, including birthdates, social security numbers, medical, financial, and insurance information.

    Find out how to prevent hackers from gaining access to healthcare data instead of having to react to some of the recent ransomware attacks on healthcare organizations around the world. In this webinar, you will learn:

    The top 10 reasons healthcare data is so at risk
    How it only takes one “open door” to steal passwords, gain access to entire databases of patient information, and install malware, making your organization a ransomware target
    The top 5 fundamental and easy “good hygiene” steps you can take today
  • 10 Things I Learned by Phishing My Company 10 Things I Learned by Phishing My Company Steve Edwards, Security Operations Manager at Duo Security Recorded: Sep 20 2016 55 mins
    Ninety-one percent of organizations in a recent TechValidate survey say they have seen phishing attacks on their organization in the past year. What’s more, 42% report more than 10 phishing attacks on their network in that time. What can be done to thwart this enormous threat and protect your data and users?

    Phishing simulation tools are a powerful way to see how many and which employees are prone to fall for phishing attacks. With this information in hand, you can determine how to train those who are susceptible to avoid these attempts, and provide the tools to protect against them.

    Hear from Steve Edwards, Duo’s Security Operations Manager, on his experience conducting internal phishing campaigns at education and tech organizations. In addition to interesting metrics and appropriate techniques that come from phishing simulations, Steve has 10 valuable lessons to share.

    Watch the recording for this webinar to learn several unexpected things about phishing, your company, and human psychology.
  • Why the Ohio State University Chose Duo Why the Ohio State University Chose Duo Helen Patton CISO, The Ohio State University & Patrick Garrity Director of Solutions Engineering, Duo Security Recorded: Sep 20 2016 53 mins
    Organizations with large, dispersed user populations face the challenge of protecting users in many different circumstances. When it comes to security, the human element is the most difficult to control, so having the right tools is essential.

    The Verizon 2016 DBIR reveals that 63% of breaches used weak, default or stolen credentials, and again they recommend two-factor authentication as one of the protective measures. But how can you get your privileged staff—not to mention others on campus—to accept something that creates a break in their workflow?

    In this webinar, you will learn:

    Why OSU selected Duo for two-factor and endpoint security
    How they eliminated the burden of provisioning
    The OSU approach to endpoint visibility

Embed in website or blog