Saturday, April 25, 2015

Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusion [feedly]



----
Best Practices for Securing Your Citrix Remote Access Against Hacker Intrusion
// Citrix Blogs

Are You Protecting Your Citrix Remote Access With Just a Password? A username and password are no longer enough to authenticate your users. Weak or stolen user credentials are the preferred weapons used by hackers, and are behind approximately 76 percent of all network intrusions. Hardware token-based solutions are no longer enough to protect against modern threats and are too expensive and cumbersome for IT…

Read More


----

Shared via my feedly reader


Sent from my iPhone