Tag: web application security

How to Protect Remote Workforce from Web Application-Based Attacks

How to Protect Remote Workforce from Web Application-Based Attacks

Information Security
How to Protect Remote Workforce from Web Application-Based Attacks The on-going pandemic has changed the way people work. Organizations around the globe have turned to cloud applications for better collaboration and productivity for their remote workforce. Microsoft has warned that today’s malicious actors are leveraging malicious web applications in gaining access to legitimate cloud services such as Office 365. In the blog post "Protecting your remote workforce from application-based attacks like consent phishing", Agnieszka Girling, Partner Group PM Manager at Microsoft said, "While application use has accelerated and enabled employees to be productive remotely, attackers are looking at leveraging application-based attacks to gain unwarranted access to valuable data in cloud services." Consent phishing, Girling said, is an example of a web application-based attack that "can target the valuable data your…
Read More

Tag: web application security

How to Protect Remote Workforce from Web Application-Based Attacks

How to Protect Remote Workforce from Web Application-Based Attacks

Information Security
How to Protect Remote Workforce from Web Application-Based Attacks The on-going pandemic has changed the way people work. Organizations around the globe have turned to cloud applications for better collaboration and productivity for their remote workforce. Microsoft has warned that today’s malicious actors are leveraging malicious web applications in gaining access to legitimate cloud services such as Office 365. In the blog post "Protecting your remote workforce from application-based attacks like consent phishing", Agnieszka Girling, Partner Group PM Manager at Microsoft said, "While application use has accelerated and enabled employees to be productive remotely, attackers are looking at leveraging application-based attacks to gain unwarranted access to valuable data in cloud services." Consent phishing, Girling said, is an example of a web application-based attack that "can target the valuable data your…
Read More