Four Common Myths about VPNs
A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...
GDPR: Who is responsible for what?
The EU General Data Protection Regulation (GDPR) and the Network Information Security (NIS) directive are already causing a flurry of activity among businesses. Who is ultimately responsible for...
Regulation for IIoT is on its way – but is it enough?
Two of the biggest technology trends today - IoT (Internet of Things) and M2M (machine-to-machine) communications - are changing the business world beyond all recognition.
How to Lose User Confidence and Jeopardize Security
Using up-to-date security software is pretty much at the top of recommended defense measures. Anti-virus and anti-phishing software filter out daily attacks from network communications. However, it is...
Smart buildings need cyber-resilience built-in
Internet of Things (IoT) and machine learning are coming together to bring about a sea change in how we use buildings, at home and in the office.
Importance of a Secure Defense for the World Cup in Russia
Major sporting events are always popular with businesses.
Authentication on PCs: Recommendations from Security Experts
Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...
Encryption is Central to EU GDPR’s Demand for Privacy
Starting May 2018, any business offering goods and services to European Union (EU) citizens will have to comply with new General Data Protection Regulation (GDPR) rules.
Is an EU-wide IT security certification program on its way?
Measures for cybersecurity are to be regulated at the European level in the future, according to the mandate of the European Commission. IT products and services may pass through a voluntary...
OVUM Report Highlights NCP’s Secure Remote Access Technology and Expansion into IoT and IIoT
We recently briefed Rik Turner, Principal Analyst of Infrastructure Solutions at Ovum Consulting, on our VPN client software (IPsec and SSL), VPN gateways, central management consoles and...