German
  • The Secret to Effective Remote Access VPN Management

    more
    NCP WTP Sponsor
    Cybersecurity Strategy · Data Security · VPN

    NCP sponsors Nürnberger Versicherungscup 2016

    NCP’s mission is to help businesses perform at the top of their game through strong and agile remote data communications access. With this in mind it is appropriate that NCP is sponsoring the Women’s...

    hands-coffee-smartphone-technology
    Encryption · Endpoint Management · Mobile · VPN

    Mobile payments and security -- money walks, money talks

    Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

    Data protection
    2 Factor Authentication · Cybersecurity Strategy · Data Security

    The national economic protection strategy in Germany and real life

    When it comes to security, public authorities in any country also want to represent their interests, some more intensively than others. Germany is not lacking in initiatives and organizations that...

    safe-913452_1920
    Cybersecurity Strategy · Encryption · Endpoint Management · Internet of Things

    Internet of Things raises fresh security challenges for industry

    For many years industries like oil and gas, electricity, agriculture and utilities have relied on operational communications infrastructure outside the main corporate network to collect data and...

    Online Data Security Concept
    Data Security · Encryption · SSL

    SSL: Still Secure When Configured Correctly

    The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...

    matrix-434035_1280
    Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

    Web of Spies

    Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

    person-smartphone-office-table
    Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

    Cloud Security Pitfalls to Avoid

    Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

    person-apple-laptop-notebook
    Data Security · Endpoint Management · Wi-Fi

    Staying Safe at Wi-Fi Hotspots

    Wi-Fi hotspots in coffee shops, hotels, railway stations and airports have become a welcome resource for any business traveler, providing them with a convenient means to carry on working while on the...

    Padlock Icon Computer Key Showing Safety Security And Protected
    Cybersecurity Strategy · Data Security

    Is Industry 4.0 Ready for the Ransomware Threat?

    Ransomware is the latest trend in criminal malware. It infects computers, encrypts data and demands a ransom payment in the form of bitcoins. The encryption is so strong that it has not yet been...

    iot
    Cybersecurity Strategy · Internet of Things · VPN

    Flaws in Industrial IoT Underline Importance of Secure Connectivity

    According to the leading analyst firm Gartner Group over 50% of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by the year 2020. The potential...