• The Secret to Effective Remote Access VPN Management

    Cybersecurity Strategy · Internet of Things · Privacy · Smart Buildings · VPN

    Regulation for IIoT is on its way – but is it enough?

    Two of the biggest technology trends today - IoT (Internet of Things) and M2M (machine-to-machine) communications - are changing the business world beyond all recognition.

    Cybercrime · Data Security

    How to Lose User Confidence and Jeopardize Security

    Using up-to-date security software is pretty much at the top of recommended defense measures. Anti-virus and anti-phishing software filter out daily attacks from network communications. However, it is...

    Data Security · Internet of Things · Smart Buildings · VPN

    Smart buildings need cyber-resilience built-in

    Internet of Things (IoT) and machine learning are coming together to bring about a sea change in how we use buildings, at home and in the office.

    Data Security · Privacy · VPN

    Importance of a Secure Defense for the World Cup in Russia

    Major sporting events are always popular with businesses.

    2 Factor Authentication · Cybersecurity Strategy · Data Security

    Authentication on PCs: Recommendations from Security Experts

    Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

    laptop-mobile (1)
    Cloud · Data Security · Encryption · VPN

    Encryption is Central to EU GDPR’s Demand for Privacy

    Starting May 2018, any business offering goods and services to European Union (EU) citizens will have to comply with new General Data Protection Regulation (GDPR) rules.

    Certificates · Data Security · Internet of Things

    Is an EU-wide IT security certification program on its way?

    Measures for cybersecurity are to be regulated at the European level in the future, according to the mandate of the European Commission. IT products and services may pass through a voluntary...
    Industry Commentary · Internet of Things · VPN

    OVUM Report Highlights NCP’s Secure Remote Access Technology and Expansion into IoT and IIoT

    We recently briefed Rik Turner, Principal Analyst of Infrastructure Solutions at Ovum Consulting, on our VPN client software (IPsec and SSL), VPN gateways, central management consoles and...

    pexels-photo (2)
    IT policy · Privacy · VPN

    SMBs Need VPNs Too

    Small business owners have many things on their mind but IT security should not be one of them. Not so long ago, network protection for a small business amounted to maintaining a firewall and some...

    hier nicht weiter
    2 Factor Authentication · Cybersecurity Strategy · VPN

    Another plea for multi-factor authentication

    A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.