NCP’s mission is to help businesses perform at the top of their game through strong and agile remote data communications access. With this in mind it is appropriate that NCP is sponsoring the Women’s Tennis Association (WTA) Nürnberger Versicherungscup taking place in Nuremberg from 15-21 May 2016.
Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time, will push making a call even lower down the list. Mobile payment, or m-payment, is taking off. Early adopters like Starbucks already attribute significant revenue gains to their investment in mobile. Although overall mobile payments adoption and usage rates are still a fraction of standard credit/debit card transactions industry watchers expect this to change very quickly.
Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being intercepted. It is no coincidence that in the same period cybercriminals have also stepped up their attempts to spy on organisations. For example, the use of Advanced Persistent Threat (APT) malware and ransomware to try to capture valuable financial or customer data for financial gain has risen dramatically. While no defense method is ever 100% impregnable the risk of snooping and theft of sensitive data can be significantly reduced by encrypting it using VPNs.
Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry. Small and medium-sized businesses in particular benefit from the way cloud services give them access to greater processing power and IT expertise than they could ever aspire to with the modest budgets and resources of their own. Cloud computing also provides an opportunity for large organizations to enjoy economies of scale for the high data volumes produced by the many and various devices, operating systems and applications they use.
Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad you’ve been putting off.
But for businesses, those New Year’s resolutions should be expressly focused on stronger security. With data breaches, email hacks and password thefts becoming more and more commonplace – and each cyberattack casting wider nets of victims – this is one resolution that can’t be allowed to fall through.