sath.com Open in urlscan Pro
2606:4700:20::ac43:447f  Public Scan

Submitted URL: http://url7816.sath.com/ls/click?upn=TpdmIErS1rlYgJOulcVRrVOJ7r5PomdLp4tpqcGOGs-2FSmoJ-2FFcACfnqOz62inQZEyzYc_r-2BtZGgcq...
Effective URL: https://sath.com/secure-remote-workers/?utm_medium=email&utm_source=fluent&utm_campaign=16-tips
Submission: On February 02 via manual from GB — Scanned from GB

Form analysis 6 forms found in the DOM

GET https://sath.com/

<form role="search" method="get" class="et-search-form" action="https://sath.com/">
  <input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>

GET https://sath.com/

<form role="search" method="get" class="et_pb_searchform" action="https://sath.com/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" name="s" placeholder="What can we help you find? " class="et_pb_s" style="padding-right: 138px;">
    <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess">
    <input type="hidden" name="et_pb_include_posts" value="yes">
    <input type="hidden" name="et_pb_include_pages" value="yes">
    <input type="submit" value="Search" class="et_pb_searchsubmit" style="">
  </div>
</form>

POST

<form data-form_id="64" id="fluentform_64" class="frm-fluent-form fluent_form_64 ff-el-form-top ff_form_instance_64_1 ff_has_v3_recptcha ff-form-loaded" data-form_instance="ff_form_instance_64_1" method="POST"
  data-recptcha_key="6Ldl6CccAAAAAHYZfM1LLD5n-3qxlTgX8dsbWC7Y">
  <fieldset>
    <legend class="ff_screen_reader">Download 16 Tips (#64)</legend><input type="hidden" name="__fluent_form_embded_post_id" value="245659"><input type="hidden" id="_fluentform_64_fluentformnonce" name="_fluentform_64_fluentformnonce"
      value="d279fb72c4"><input type="hidden" name="_wp_http_referer" value="/secure-remote-workers/">
    <div data-name="ff_cn_id_1" class="ff-t-container ff-column-container ff_columns_total_1  ">
      <div class="ff-t-cell ff-t-column-1" style="flex-basis: 100%;">
        <div data-type="name-element" data-name="names_2" class=" ff-field_container ff-name-field-wrapper">
          <div class="ff-t-container">
            <div class="ff-t-cell ">
              <div class="ff-el-group  ff-el-form-top">
                <div class="ff-el-input--label asterisk-right"><label for="ff_64_names_2_first_name_" aria-label="First Name">First Name</label> </div>
                <div class="ff-el-input--content"><input type="text" name="names_2[first_name]" id="ff_64_names_2_first_name_" class="ff-el-form-control" placeholder="First Name" aria-invalid="false" aria-required="false"></div>
              </div>
            </div>
            <div class="ff-t-cell ">
              <div class="ff-el-group  ff-el-form-top">
                <div class="ff-el-input--label asterisk-right"><label for="ff_64_names_2_last_name_" aria-label="Last Name">Last Name</label> </div>
                <div class="ff-el-input--content"><input type="text" name="names_2[last_name]" id="ff_64_names_2_last_name_" class="ff-el-form-control" placeholder="Last Name" aria-invalid="false" aria-required="false"></div>
              </div>
            </div>
          </div>
        </div>
        <div class="ff-el-group ff-el-form-hide_label">
          <div class="ff-el-input--label ff-el-is-required asterisk-right"><label for="ff_64_email" aria-label="Enter Your email">Enter Your email</label> </div>
          <div class="ff-el-input--content"><input type="email" name="email" id="ff_64_email" class="ff-el-form-control" placeholder="Email Address" data-name="email" aria-invalid="false" aria-required="true"></div>
        </div>
        <div class="ff-el-group ff-text-center ff_submit_btn_wrapper ff_submit_btn_wrapper_custom"><button class="ff-btn ff-btn-submit ff-btn-md orange-but-new but-full ad-sso-guide ff_btn_no_style" type="submit" name="custom_submit_button-64_1"
            data-name="custom_submit_button-64_1">Download</button></div><input type="hidden" name="tag_name" value="" data-name="tag_name"><input type="hidden" name="hidden" data-name="hidden">
      </div>
    </div>
  </fieldset>
</form>

GET https://sath.com/

<form role="search" method="get" class="et_pb_searchform" action="https://sath.com/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" name="s" placeholder="Search Articles" class="et_pb_s" style="padding-right: 122px;">
    <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess">
    <input type="hidden" name="et_pb_include_posts" value="yes">
    <input type="hidden" name="et_pb_include_pages" value="yes">
    <input type="submit" value="Search" class="et_pb_searchsubmit" style="">
  </div>
</form>

POST

<form data-form_id="14" id="fluentform_14" class="frm-fluent-form fluent_form_14 ff-el-form-top ff_form_instance_14_2 form-newsletter-container ff_has_v3_recptcha ff-form-loaded" data-form_instance="ff_form_instance_14_2" method="POST"
  data-recptcha_key="6Ldl6CccAAAAAHYZfM1LLD5n-3qxlTgX8dsbWC7Y">
  <fieldset>
    <legend class="ff_screen_reader">Newsletter Blog (#14)</legend><input type="hidden" name="__fluent_form_embded_post_id" value="245659"><input type="hidden" id="_fluentform_14_fluentformnonce" name="_fluentform_14_fluentformnonce"
      value="d279fb72c4"><input type="hidden" name="_wp_http_referer" value="/secure-remote-workers/">
    <div class="ff-el-group ff-el-form-hide_label form-newsletter">
      <div class="ff-el-input--label ff-el-is-required asterisk-right"><label for="ff_14_email" aria-label="Email">Email</label> </div>
      <div class="ff-el-input--content"><input type="email" name="email" id="ff_14_email" class="ff-el-form-control" placeholder="Enter Your Email" data-name="email" aria-invalid="false" aria-required="true"></div>
    </div>
    <div class="ff-el-group ff-text-left form-newsletter-button ff_submit_btn_wrapper"><button type="submit" class="ff-btn ff-btn-submit ff-btn-md orange-but-new but-full ff_btn_style">Sign Up!</button></div>
  </fieldset>
</form>

POST

<form data-form_id="13" id="fluentform_13" class="frm-fluent-form fluent_form_13 ff-el-form-top ff_form_instance_13_3 form-newsletter-container ff_has_v3_recptcha ff-form-loaded" data-form_instance="ff_form_instance_13_3" method="POST"
  data-recptcha_key="6Ldl6CccAAAAAHYZfM1LLD5n-3qxlTgX8dsbWC7Y">
  <fieldset>
    <legend class="ff_screen_reader">Newsletter Footer Sign UP (#13)</legend><input type="hidden" name="__fluent_form_embded_post_id" value="245659"><input type="hidden" id="_fluentform_13_fluentformnonce" name="_fluentform_13_fluentformnonce"
      value="d279fb72c4"><input type="hidden" name="_wp_http_referer" value="/secure-remote-workers/">
    <div class="ff-el-group ff-el-form-hide_label form-newsletter">
      <div class="ff-el-input--label ff-el-is-required asterisk-right"><label for="ff_13_email" aria-label="Email">Email</label> </div>
      <div class="ff-el-input--content"><input type="email" name="email" id="ff_13_email" class="ff-el-form-control" placeholder="Enter Your Email" data-name="email" aria-invalid="false" aria-required="true"></div>
    </div>
    <div class="ff-el-group ff-text-center form-newsletter-button ff_submit_btn_wrapper"><button type="submit" class="ff-btn ff-btn-submit ff-btn-md orange-but-new lead-gen goal-signup signup ff_btn_style">Sign Up!</button></div>
  </fieldset>
</form>

Text Content

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

 * Increase TextIncrease Text
 * Decrease TextDecrease Text
 * GrayscaleGrayscale
 * High ContrastHigh Contrast
 * Negative ContrastNegative Contrast
 * Light BackgroundLight Background
 * Links UnderlineLinks Underline
 * Readable FontReadable Font
 * Reset Reset

 * What is IAM?
 * IDHub
   * Start Here
   * Plan Comparison
   * Solutions
     * Build
       * Lifecycle Management
       * Profile Management
       * Provision Access
       * Reconciliation
         
     * Secure
       * Role Based Access
       * Certifications
       * Audit & Reporting
         
     * Manage
       * Privileged Access
       * Approve and Fullfill
       * Remediation
       * Communication
       * Application Onboarding
       * Single Pane of Glass
         
     * Schedule A Chat
       
   * IDHub Vs. ???
     * An Okta Alternative
     * A OneLogin Competitor
       
   * IDHub Extras
     * Custom Workflows
     * Custom Access Forms
     * Manager Control
     * Service Requests
     * Custom Certifications
     * Proxy Users
       
   * IDHub Support
     * Support Options
     * Paid Support
     * Managed Services
     * Implementation
       
   * IDHub Pricing
   * Schedule A Demo
   * AccessHub
     
 * Resources
   * Sath IAM Blog
   * IDHub Videos
   * Talk Nerdy
   * 5 Things Newsletter
   * Datasheets
   * Downloads
   * Community
     
 * Company
   * About Sath Inc.
   * Our Clients
   * Our Identity Management Process For User Access
   * Our Team
   * Careers
   * Our Interview Process
     
 * Legal
   * Software Customer Agreement
   * Security Policies
   * Customer Use Addendum
   * Third Party Code
   * Privacy Policy
   * Terms Of Use
   * Copyright and Trademark Violations
     
 * Contact
   * Contact Us
   * Support Request
     


 * What is IAM?
 * IDHub
 * Solutions
 * Resources

 * What is IAM?
 * IDHub
 * Solutions
 * Resources

SCHEDULE A CALLDemoPricing
u


Search for:
START HERE!
How is IDHub Different?
 * Start Here

PLANS
PRICING
 * Available Support
 * Support Options
 * Paid Support
 * Implementation
 * Managed Services

 * Integrations
 * Integration Center
 * Application Connectors

ACCESSHUB
 * Compare

IDHub vs.Manual
IDHub vs.Okta
IDHub vs.OneLogin
START HERE!
 * Start Here

 * Build Identities
 * Lifecycle Management
 * Profile Management
 * Access Provisioning
 * Reconciliation

 * Manage
 * User Requests
 * Approve And Fullfill
 * Remediation
 * User Notifications
 * Application Onboarding
 * Single Pane of Glass

 * Secure
 * Role Based Access
 * Access Certification Process
 * Audit & Reporting

 * Integrations
 * Integration Center
 * Application Connectors

PRICING
ACCESSHUB
DOWNLOADS
DATASHEETS
BLOG
VIDEOS
PRESS
COMMUNITY
PARTNERSHIPS
POC REQUEST
SUPPORT
CONTACT
TALK NERDY TO ME
5 THINGS NEWSLETTER
Glossary Of Terms
How Is IDHub Different?
 * Build Identities
 * Lifecycle Management
 * Profile Management
 * Access Provisioning
 * Reconciliation

 * Secure
 * Role Based Access
 * Access Certification Process
 * Audit & Reporting

 * Manage
 * User Requests
 * Approve And Fullfill
 * Remediation
 * User Notifications
 * Application Onboarding
 * Single Pane of Glass

 * Integrations
 * Integration Center
 * Application Connectors

 * IDHUB EXTRAS
 * Manager Control
 * Custom Certifications
 * Service Requests
 * Custom Workflows
 * Access Request Forms
 * Shared Lists
 * User Proxies


SECURE REMOTE WORKERS: 16 TIPS TO WORK SAFELY AT HOME

by Casey Whitcher | Feb 2, 2023 | Blog





BUSINESSES STILL STRUGGLE TO SECURE REMOTE WORKERS.

The sudden shift to remote work during the early weeks of Covid-19 was a
difficult adjustment for many organizations.
Almost two-thirds of businesses had to transition over half of their workforce
overnight. In addition, less than half of organizations had a business
continuity plan before the pandemic.

This rapid shift to remote work affected everything from basic connectivity to
critical business applications. The entire process made basic operations a
formidable challenge.

In response to the pandemic, many organizations scrambled to find "good enough"
solutions, a fact not lost on would-be hackers (more on that in a bit).

Companies invested further in remote work solutions. For example, 40% of
businesses spent more on skilled IT workers to support the now remote IT staff
to troubleshoot issues, enable security, and ensure productivity for employees
working from home.



The pandemic normalized remote work for many organizations which had very
limited or no telecommuting as policy previously.

Many organizations faced severe difficulties in the transition. Nevertheless,
they generally found that they could provide employees with the necessary
resources and maintain near-fully remote successful businesses.

However, the new work environment brought new challenges and threats.

As a result of the mass transition and the resulting cost-benefit analysis, many
companies are planning to allow more remote work indefinitely. Over 50% of
employers plan to permanently expand or increase flexible work arrangements.
Only 15% of companies report not planning to revisit remote work options
post-COVID-19.

Download The 16 Tips To Secure Remote Workers PDF






WHAT ARE THE MOST SIGNIFICANT SECURITY RISKS FOR REMOTE EMPLOYEES?


PHISHING



Phishing is a cyberattack used to acquire sensitive information or data from
individuals or organizations.

Phishing attacks launch through fake websites, emails, or attachments that
appear to be from a legitimate source. But are malicious attempts to gain access
to confidential information. This attack is particularly hazardous to remote
employees due to their lack of direct contact with their employers and tech
staff.

Phishing attacks can have severe consequences for individuals and organizations
as they are usually the first entry point to much more severe infiltrations.

Phishing attacks can lead to severe financial losses and data breaches and
damage an organization's reputation costing far more in the long run.


WEAK PASSWORD SECURITY

Oddly enough, weak password security is still a significant security risk for
remote employees due to a lack of single sign-on solutions or two-factor
authentication and often relying on user-generated passwords rather than, at a
minimum, using sophisticated password managers.

As most people know, malicious actors can easily exploit weak or duplicate
passwords. For example, if an employee reuses a weak password across multiple
accounts, a breach on one of those accounts will expose all of the employee's
data.

Additionally, if a hacker compromises an employee's personal account, they will
use that password to access the work accounts, leading to a devastating breach.


UNMANAGED PERSONAL DEVICES AND REMOTE ACCESS

One of the remote staff's most significant security risks is using improperly
patched or outdated software on personal devices to access work resources.

When unmanaged devices are compromised, they open up new vulnerabilities across
the network.



Relying on users to maintain proactive best practice security protocols on their
devices has frequently led to ransomware attacks and other security breaches on
business networks.

Ultimately, the best practice for remote employee security is to provide managed
company devices or office computers that are correctly updated and secured and
have clear policies to govern how employees work remotely and how they protect
the equipment at their homes.


UNSECURED DIRECT ACCESS TO CLOUD AND SAAS APPS

The security risks associated with unsecured cloud and SaaS app access for
remote employees add to the potential for breaches.

The lack of oversight by IT staff can result in unauthorized access to corporate
data.

The risks of malware and malicious attacks multiply when users use non-company
equipment to access internal resources.


HACKERS SAW REMOTE WORK AS AN OPPORTUNITY

When cyber attackers saw the rapid shift to remote work, they recognized the
chance to exploit the increased use of personal devices.

Hackers knew that the attack surface had greatly expanded and weakened
simultaneously.

Phishing attacks compromised businesses through email schemes, ransomware, and
even nation-state-backed campaigns. All hacking types saw a massive surge in
activity due to the increased vulnerability of remote workers and their
endpoints.

This sharp increase in attacks was elevated even further by remote IT staff and
the use of less-than-optimal technology.
As a result, organizations had to rush to find new and secure ways to connect,
maintain, and secure access to business-critical resources.


HOW TO ADDRESS REMOTE WORK SECURITY CHALLENGES?



Step 1: Develop a documented work-from-home security policy that outlines
acceptable use and security measures that all employees should follow.

Step 2: Restrict business operations to business devices or Implement a
Bring-Your-Own-Device (BYOD) policy, as many employees may use their personal
devices to access company systems and data. This policy should include how to
securely register and maintain machines and which software and networks
employees may use.

Step 3: Provide cyber security awareness training and tips to employees (Such as
the PDF download below) to ensure that they understand the risks associated with
working remotely and know how to protect themselves from potential threats.

Step 4: Use a secure video teleconferencing platform that provides end-to-end
encryption, such as Zoom, Microsoft Teams, or WebEx.

Step 5: Invest in a centralized storage solution, such as a cloud storage
system, and encourage staff to back up data regularly.

Step 6: Use up-to-date, secure antivirus and anti-malware software to detect and
remove malicious programs.

Step 7: Utilize Single Sign-on, or at a minimum, password managers with
two-factor authentication when accessing company systems and data.


WHAT ARE REMOTE WORK SECURITY BEST BUSINESS PRACTICES TO REDUCE RISKS?

 1. Establish Identity Access Management (IAM) & Multi-Factor Authentication
    (MFA): IAM platforms are essential for effectively managing and monitoring
    secure access to corporate systems and data, regardless of the user's
    location. 
 2. Require Multi-factor authentication whenever users sign in to a corporate
    system.
 3. Implement Encryption Strategies: Encrypting data helps organizations protect
    their information at all times, including when it moves beyond the corporate
    network.
 4. Manage Endpoints: Security teams must ensure they have proper visibility and
    oversight of the various devices employees use when working from home and
    other remote locations. 
 5. Require that personal devices comply with corporate security protocols.
 6. Monitor and Test: Monitoring environments for unusual activity and other
    signs of potential threats can prevent or stop a security breach before too
    much damage is done. 
 7. Regular testing of systems for potential vulnerabilities is also beneficial.
 8. Use Corporate Email Solutions - Require employees to use corporate email
    solutions to store or transmit personal data rather than rely on their
    messaging accounts.
 9. Regularly conduct third-party risk assessments - Contract a third-party
    security partner to assess vulnerabilities. Risk assessments can identify
    company system and procedure weaknesses using the same processes a hacker
    would to breach the system.


CYBER EDUCATION IS CRITICAL

Cybersecurity threats are on the rise due to a variety of factors. However, more
remote workers and personal devices may be the most significant factor.

In Cybersecurity, employees are the first line of defense and also the weakest.

Organizations must ensure their remote workers receive proper cyber security
training and education to mitigate the high risk of human error, negligence,
ignorance, and susceptibility to schemes.

Security training should include:

 * A review of the company's policies.
 * Details about the methods and processes it contains.
 * Recognizing phishing emails
 * Properly using secure network connections.
 * General Security Practices

Additionally, remind workers of the risks of using simple passwords.

Cyber education is vital to protecting organizations, as employees are the most
common entry point.


TIPS FOR REMOTE WORK FROM HOME USERS

 1. Never log in to a website from an email link.
 2. Never leave office devices unattended.
 3. Avoid personal browsing on office devices.
 4. Keep personal information hidden during video meetings.
 5. Hide your home WiFi network by turning off the broadcast setting.

Read the complete list of 16 tips with additional details on each by downloading
the printable PDF file to share with your team.



FREE DOWNLOAD: 16 Security Tips For Remote Workers


Download 16 Tips (#64)
First Name

Last Name

Enter Your email

Download



STEPS TO PROTECT DATA IN REMOTE WORK ENVIRONMENTS

Steps to Protect Data in Remote Work Environments:

 1. Implement Disk Encryption: All endpoints should be protected with full disk
    encryption to prevent sensitive data from being read from the memory of a
    misplaced device.
 2. Utilize Data Loss Prevention (DLP): All emails and messages on collaboration
    apps should be scanned for sensitive data to ensure that it is not leaked to
    an unauthorized party.
 3. Implement File Classification: Automated scanning of files for sensitive
    content should be employed to ensure that data can be appropriately marked
    and secured.


IMPROVE YOUR SECURITY AND CUT IT WORKLOAD.

DESIGNED FOR YOU

Schedule a quick 5-minute chat.

SCHEDULE


ENTERPRISES MUST ADAPT TO LONG-TERM CHANGES TO SECURE REMOTE WORKERS

Step 1: Begin by investing in security solutions designed to provide the
flexibility and scalability needed to secure remote work.

Step 2: Develop and implement a comprehensive business continuity plan to
address potential emergency scenarios.

Step 3: Ensure that the IT team is prepared to respond quickly to changes and
scale up to ensure business continuity.

Step 4: Plan for a hybrid IT infrastructure that includes on-premises networks,
co-location environments, and public and private clouds.

Step 5: Utilize a security-driven networking approach that converges networking
and security to protect the enterprise at every edge, from network to cloud.

Step 6: Monitor the remote workforce and update security protocols as needed.

By following these steps, enterprises can adapt to secure remote work for the
long term. Investing in the necessary tools and protocols to ensure remote
workers' safety and security and the data they access is important.

BLOG / VIDEOS / TALK NERDY / PRESS / DATASHEETS / 5 THINGS

Share This Article

Search for:

How Much Cash Are You Losing Managing User Access?

Calculate

GET THE LATEST SECURITY NEWS AND STORIES TO YOUR INBOX

Newsletter Blog (#14)
Email

Sign Up!




COULD YOUR IT TEAM USE AN EXTRA 10, 30, OR 100 HOURS PER WEEK?

Find Out How Many Hours You'd Save With A Quick 10-Minute Chat.

schedule


RELATED ARTICLES


CONTAIN THE CHAOS – A SIMPLE USER ACCESS MANAGEMENT TOOL

Blog

Unlock the power of access control with user access management tools. Easily
manage and control user access to all your business resources. Make sure only
the right people have the right access.


CYBERSECURITY AND AI 🤖 IN 2023: 5 TIPS TO 🔐 PROTECT YOUR DATA SECURITY

Blog

Cybersecurity and AI has evolved in 2023. Uncover the latest threats and learn
what you can do to protect your networks. Read how hackers are attacking today
to stay ahead of the game.


35 BEST SSO PROVIDERS: WHAT YOU NEED TO KNOW BEFORE YOU INVEST

Blog

Discover the 35 best SSO providers that can help you create a secure and
seamless authentication process. Get all the information you need to make a wise
investment decision.


SATH INDUSTRY NEWSLETTER.

Get the latest fascinating information about the state of business cybersecurity
and news from Sath and IDHub directly to your inbox.

Newsletter Footer Sign UP (#13)
Email

Sign Up!



SEE THE POSSIBILITIES.

Identity Management Tailored To Your Business Needs

BOOK A CALL
United States

125 W Central Rd
Schaumburg, IL 60195

India

7th Floor, IMA house,
11/3 Dr. Biresh Guha Street,
Park Circus, Ballygunge,
Kolkata, West Bengal: 700017

Legal
 * Software Customer Agreement
 * IDHub Support Option Comparison
 * Third Party Code
 * Privacy Policy
 * Customer Use Addendum
 * Copyright and Trademark Violations
 * Terms Of Use
 * ADA Compliance and Accessibility

 * Software Customer Agreement
 * IDHub Support Option Comparison
 * Third Party Code
 * Privacy Policy
 * Customer Use Addendum
 * Copyright and Trademark Violations
 * Terms Of Use
 * ADA Compliance and Accessibility

Company
 * About Sath
 * Careers
 * Our Team
 * Our Clients
 * Awards
 * In The Press
 * Press Kit

 * About Sath
 * Careers
 * Our Team
 * Our Clients
 * Awards
 * In The Press
 * Press Kit

Contact
 * Support
 * Contact Us
 * Press Kit

 * Support
 * Contact Us
 * Press Kit

 * Follow
 * Follow
 * Follow
 * Follow
 * Follow

COPYRIGHT © 2023 - MADE WITH LOVE IN SCHAUMBURG AND KOLKATA
We use cookies to give you and other users the best experience possible. By
clicking “Accept”, you consent to the use of cookies and agree to our Cookie
Policy. Sath will never sell your data.
Cookie settingsACCEPT
Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the ...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Functional
Functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.

CookieDurationDescription__cf_bm30 minutesThis cookie is set by CloudFlare. The
cookie is used to support Cloudflare Bot Management.__hssc30 minutesThis cookie
is set by HubSpot. The purpose of the cookie is to keep track of sessions. This
is used to determine if HubSpot should increment the session number and
timestamps in the __hstc cookie. It contains the domain, viewCount (increments
each pageView in a session), and session start timestamp.

Performance
Performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.
Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.

CookieDurationDescription__hstc1 year 24 daysThis cookie is set by Hubspot and
is used for tracking visitors. It contains the domain, utk, initial timestamp
(first visit), last timestamp (last visit), current timestamp (this visit), and
session number (increments for each subsequent session)._ga2 yearsThis cookie is
installed by Google Analytics. The cookie is used to calculate visitor, session,
campaign data and keep track of site usage for the site's analytics report. The
cookies store information anonymously and assign a randomly generated number to
identify unique visitors._ga_7700EB8V9Y2 yearsThis cookie is installed by Google
Analytics._gat_UA-25592398-71 minuteThis is a pattern type cookie set by Google
Analytics, where the pattern element on the name contains the unique identity
number of the account or website it relates to. It appears to be a variation of
the _gat cookie which is used to limit the amount of data recorded by Google on
high traffic volume websites._gcl_au3 monthsThis cookie is used by Google
Analytics to understand user interaction with the website._gid1 dayThis cookie
is installed by Google Analytics. The cookie is used to store information of how
visitors use a website and helps in creating an analytics report of how the
website is doing. The data collected including the number visitors, the source
where they have come from, and the pages visted in an anonymous form.CONSENT16
years 4 months 20 days 7 hours 16 minutesThese cookies are set via embedded
youtube-videos. They register anonymous statistical data on for example how many
times the video is displayed and what settings are used for playback.No
sensitive data is collected unless you log in to your google account, in that
case your choices are linked with your account, for example if you click “like”
on a video.hubspotutk1 year 24 daysThis cookie is used by HubSpot to keep track
of the visitors to the website. This cookie is passed to Hubspot on form
submission and used when deduplicating contacts.vuid2 yearsThis domain of this
cookie is owned by Vimeo. This cookie is used by vimeo to collect tracking
information. It sets a unique ID to embed videos to the website.

Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.

CookieDurationDescription_fbp3 monthsThis cookie is set by Facebook to deliver
advertisement when they are on Facebook or a digital platform powered by
Facebook advertising after visiting this website.fr3 monthsThe cookie is set by
Facebook to show relevant advertisments to the users and measure and improve the
advertisements. The cookie also tracks the behavior of the user across the web
on sites that have Facebook pixel or Facebook social plugin.IDE1 year 24
daysUsed by Google DoubleClick and stores information about how the user uses
the website and any other advertisement before visiting the website. This is
used to present users with ads that are relevant to them according to the user
profile.test_cookie15 minutesThis cookie is set by doubleclick.net. The purpose
of the cookie is to determine if the user's browser supports
cookies.VISITOR_INFO1_LIVE5 months 27 daysThis cookie is set by Youtube. Used to
track the information of the embedded YouTube videos on a website.YSCsessionThis
cookies is set by Youtube and is used to track the views of embedded
videos.yt-remote-connected-devicesneverThese cookies are set via embedded
youtube-videos.yt-remote-device-idneverThese cookies are set via embedded
youtube-videos.yt.innertube::nextIdneverThese cookies are set via embedded
youtube-videos.yt.innertube::requestsneverThese cookies are set via embedded
youtube-videos.

Others
Others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

CookieDurationDescription_calendly_session21 daysNo description
available._pk_id.5.06cb1 year 27 daysNo description_pk_id.5.99671 year 27 daysNo
description_pk_ses.5.06cb30 minutesNo description_pk_testcookie_domainNo
description_tcfpup5 yearsNo description available._tcSecSesssessionNo
description available._tcSessInfosessionNo description
available.cookielawinfo-checkbox-functional1 yearThe cookie is set by GDPR
cookie consent to record the user consent for the cookies in the category
"Functional".esig_session_id1 dayNo descriptionfirst_session1 month 1 dayNo
description available.shopmagic_visitor_e7ff0307268106c16d30573ee129c84c1 yearNo
descriptionti_ukp5 yearsNo description available.W_GUID1 dayNo descriptionW_LMT1
dayNo description

SAVE & ACCEPT
Powered by