• The Secret to Effective Remote Access VPN Management

    Blog · Cloud · Cybersecurity Strategy · Data Security

    The Cloud Presents New Risks for Financial Services

    The world’s major financial institutions know the winds of change are here. They are well aware that if they stick to traditional banking methods underpinned by decades-old technology they will be...

    Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

    Friend or Foe: The Importance of Multi-Factor Authentication

    The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

    Cybercrime · Cybersecurity Strategy · Data Security

    Tiny loopholes that can wreak havoc

    Pentesters only need a tiny loophole to gain access to the victim's network and discover and exploit further vulnerabilities. Companies who commission pentesters understandably do not publish any...

    Data Security

    Easing Hospitals' Mobile Data Security Worries

    Mobile communications devices are transforming healthcare services worldwide. Whether helping front line staff to share electronic medical records (EMR), deliver more timely diagnoses through remote...

    2 Factor Authentication · Cybersecurity Strategy

    Naivety, absurdity or just plain and understandable frustration? Why do we not learn from our mistakes in cybersecurity?

    More than half of all users active on the Internet (55%) have been affected by fraud, according to a study by FICO. But this has by no means led to better security precautions and increased awareness....

    Cybersecurity Strategy · Data Security

    ISPs make a play for control of data privacy

    Forget Facebook, forget Google, forget Amazon – privacy defenders they most certainly are not, but their transgressions may prove to be nothing compared to the privacy threat currently posed by the...

    Cybercrime · Cybersecurity Strategy · Internet of Things

    New threats posed by closing the gap between IT and OT

    The gap between office Information Technology (IT) and Operational Technology (OT) −everything that networks, controls and evaluates machines in industrial environments − has been closing for some...

    Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things · IT policy · VPN

    Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT

    In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

    Windows 8

    Summer, sun and hackers – Tips for avoiding IT security risks on holiday

    If you feel great after your holiday but find your bank account empty, perhaps the shopping trip on the Via Monte Napoleone went a little too far. But if you are not the culprit, cybercriminals may...

    Blog · Data Security · Encryption

    Retailers must balance data privacy with personalization

    The retail industry is increasingly moving online. In its figures for 2017, the U.S. Census Bureau cited national online retail sales at $119 billion. Meanwhile, the Facebook privacy scandal has...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.