German

Post of category IT policy

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

vpn
Cybersecurity Strategy · Encryption · Endpoint Management · IT policy · VPN

Four Common Myths about VPNs

A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...

pexels-photo (2)
IT policy · Privacy · VPN

SMBs Need VPNs Too

Small business owners have many things on their mind but IT security should not be one of them. Not so long ago, network protection for a small business amounted to maintaining a firewall and some...

security-protection-anti-virus-software-60504
Cloud · IT policy · SSL · VPN

The Rise of Cloud-based Services Fuels Demand for Managed VPNs

The growing popularity of cloud services coupled with security concerns is driving demand for managed VPNs. In particular, the success of public cloud services is gradually encouraging more...

laptop-mobile
Data Security · IT policy · VPN · Wi-Fi

Business Benefits of Staying Anonymous Online

A new report from UK anti-fraud organization CIFAS shows record levels of identity theft.

pexels-photo-140945
Endpoint Management · Internet of Things · IT policy · VPN

The Secret to Effective Remote Access VPN Management

According to Ponemon Institute, the growing number of employees using multiple personal and company-owned mobile devices to connect to corporate networks is the biggest endpoint security threat today....

pexels-photo-90333
Endpoint Management · Internet of Things · IT policy · VPN

Strategies for Managing Large-Scale VPN Deployments

Large organizations today are experiencing a rapid evolution in technology that is challenging traditional security systems and infrastructures.

network
IT policy · VPN

When plan B needs a plan C

Just a few days ago, news began circulating on the internet of a strange problem with Cisco routers which was easy to identify as it caused complete failure. Shortly afterwards, Cisco issued a warning...

Cybersecurity Strategy · IT policy

Realizing the potential of exploit toolkits

Anti-virus companies have identified a new trend: Criminals are increasingly using open source software instead of developing or purchasing their own malware. Kaspersky Lab recently revealed several...