• The Secret to Effective Remote Access VPN Management

    Cybersecurity Strategy · Public Hotspot · VPN · Wi-Fi

    Simple steps to a secure public hotspot connection

    In just a short time, our working lives have been transformed. 

    Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

    IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

    The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

    Cybersecurity Strategy · Internet of Things · VPN

    A priority on today’s to do list: Please secure remote access once and for all!

    Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

    Cybersecurity Strategy · Internet of Things · VPN

    Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems

    Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.

    2 Factor Authentication · Cybersecurity Strategy · Data Security

    Top 5 security vulnerabilities are always the same

    The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

    Cybercrime · Data Security · Encryption · Mobile · VPN

    Mitigating Retail Vulnerabilities

    Retailers are top targets for cybercriminals.

    Data Security · Internet of Things · VPN

    The IoT gateway next door

    Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly...

    Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

    Protecting virtual worlds of data in motion

    Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

    Eyeball spy
    Encryption · Privacy · VPN

    Does more surveillance offer more protection?

    The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as...

    Cybersecurity Strategy · Encryption · VPN

    Lack of encryption is putting customer data at risk

    Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption.  If this proves true, then many more organizations may be putting customer...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.