Remote Access Security: 5 Best Practices for Remote Workers

Lock down your organization’s remote access security with multi-factor authentication, zero trust principles, and sophisticated user analytics.

Top Remote Work Security Risks Every Organization Should Know

Learn about the top remote work security risks and how to mitigate them to protect your organization’s assets.

The Work-Life Mix-up: How to Stay Secure in the Hybrid Work Era

Workers’ attitudes toward work and technology have shifted, and with this, the security landscape has also changed.

BYOD Increases Mobile Phishing Rates, and the Risks Have Never Been Higher

We've just published our Global State of Mobile Phishing report, which explores phishing trends and the risk they present to both your data and your financial bottom line.

Protecting Data and Promoting Collaboration During Times of Change

Organizations that try to keep using their perimeter-based security solutions are hindering their workers’ ability to collaborate while also losing a handle on their data.

Organizations Are Banning TikTok. Should You Do the Same?

The popular social media app TikTok has come up time and time again when discussing data privacy concerns. Now, state governments are banning it from government-owned devices.

BYOD and Phishing Attacks: Top Threats Facing US Government

Lookout recently released our 2022 US Government Threat Report and we've picked out the main takeaways about the top threats currently facing U.S. government organizations.

Work and Life Have Intertwined: Why You Need to Protect Against Phishing

Don't bring your personal life into the office; don't bring your work stuff home — these were already difficult tasks prior to the 2020 pandemic.

How a Hybrid Approach Helped a Hospital System Leverage Existing Investments and Secure Cloud-Based Tools

Lookout helped this large university health system augment their legacy DLP tool by extending their reach to the cloud so they can remain compliant.

How Lookout Enforces Consistent Policies Across a Hybrid Cloud and Keeps Patient Data Secure

See how Lookout helped them protect their sensitive data and meet compliance regulations as they migrated to full cloud adoption.

Code Blue: Healthcare Security in the Age of 5G and Remote Work

Why were hospitals so frequently breached by attacks? To answer that question, I turned to an old friend of Lookout — former CISO Mike Murray.

The Federal Office Has a New Look: Here’s How to Keep it Secure

To fully secure a telework environment, agencies need to tackle two objectives – mobile threat awareness and a comprehensive mobile endpoint security strategy.

How to Pragmatically Embrace Mobility in Response to a Remote Workforce

The Coronavirus has impacted businesses and employees in a myriad of ways, and one common thread is the sudden need for employees to work remotely.

How to Embrace Mobility in Response to a Remote Workforce

Because of Coronavirus, organizations may want to rush into adopting a BYOD program so that employees can work more effectively from home. But what about the new risks?

Securing Enterprise Mobility Is Driving Record Growth at Lookout

Controlling mobile access to corporate data is a top priority and proactive CISOs are selecting Lookout to accelerate secure mobility in the workplace.

Everyone Talks About TikTok but Here’s Why BYOD Is the Real Threat

How to effectively stop phishing attacks at the mobile device level and restrict usage of apps that pose a growing threat to your data and workforce.

Mobile Security for State and Local Agencies

Lookout Security expert Jose Garcia covers strategies for Mobile Endpoint Security and provides information on mobile security, BYOAD, and the emerging threat landscape.

No items found.