German

Post of category Mobile

smartphone
Cybercrime · Cybersecurity Strategy · Mobile · VPN

The risk of attack is getting closer – mobile devices in focus

Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for...

pexels-photo-59519
Data Security · Internet of Things · Mobile · Public Hotspot · VPN · Wi-Fi

Going on Holiday? Don’t Forget to Pack Your VPN

People have become accustomed to using their mobile devices for the dual purposes of business and leisure.

macbook-apple-imac-computer-39284
BYOD · Data Security · Endpoint Management · Internet of Things · Mobile · VPN

Enabling Secure Remote Connectivity for Apple Devices

With over one billion active users worldwide, Apple continues to offer the most diverse product line from Apple Watches to Macs, to iPads and iPhones.

pexels-photo-196410
Cybercrime · Mobile · VPN

The summer holiday season brings extra risk for restaurants and hotel chains

US retailers have been having a tough time of late. 

rsa-conference-image_full-size
Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

pexels-photo-204475
Cybercrime · Data Security · Encryption · Mobile · VPN

Mitigating Retail Vulnerabilities

Retailers are top targets for cybercriminals.

pexels-photo-54284
Data Security · Mobile · VPN · Wi-Fi

Mobile Banking Apps: How Safe are They?

Mobile banking apps are set to bring seismic changes to the banking industry.

internetsecurity
Mobile · VPN

Internet Security Programs for Students

Guest blog post from Daniel Waterman

pexels-photo-129632
Data Security · Mobile

Is Mobile Security Broken?

The way we work has changed. No longer tied to our desks, our laptops, tablets and smartphones let us do our job from wherever we want – at the office, at home or even while on-the-move. We can also...

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...