Remote Access VPNs For Dummies
IT policy · VPN

It's Time for Retailers to Tell Point-of-Sale Hackers to 'Back Off'

It's Groundhog Day all over again for retailers, following the U.S. Department of Homeland Security's warning that they could, once again, be exploited by malicious actors.

Network Security Battlefield
Endpoint Management · VPN

Poor Communication Leads to Defeat on the Network Security Battlefield

In September 1862, the 27th Indiana Infantry Regiment, situated near Frederick, Maryland, made a discovery that could have altered the Civil War. It all began without much fanfare. Two soldiers...

Endpoint Management · IT policy · Mobile

Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

It's a tough time to be a BlackBerry user.  Despite having a committed fan in the Oval Office and some new features to brag about, including a digital assistant, BlackBerry has seen Android, Apple...

Endpoint Management · IT policy

Broward College Deploys a Network Security Strategy Fit for the Best and Brightest

In the 1930s, when Louis A. Simon designed the famous U.S. Bullion Depository at Fort Knox, he could only have hoped that the building would be so secure, so impenetrable, that generations of...

Endpoint Management · VPN

Are Privileged Users the ‘Weak Link’ in Your Network Security?

If a group is really only as strong as its “weakest link,” then why are so many enterprises, which are otherwise concerned about their network security, so quick to add new “links”? Every new user...

Industry Commentary · VPN

Hacks of Houston Astros, Butler University Put Network Security on Center Stage

Even though the Houston Astros have been the worst team in Major League Baseball for the last three seasons, one of the team's off-the-field accomplishments — its proprietary internal computer...

Industry Commentary · IT policy

Government Network Security Failures Led to Remote Access Breaches

As technology advances, the number of cyber-attacks on both public and private networks also increases. According to the Washington Post, in 2013 alone, more than 3,000 enterprises were notified of...

Encryption · IT policy

IoT: Get Security Right The First Time

Let's start building security into the Internet of Things now, before everything becomes connected -- and hackable.

Endpoint Management · IT policy · VPN

Why a User-Centric Approach is Required for Network Security

Is your enterprise one of the many that are "subject to the whims of fickle consumer-business users" when it comes to adopting new technology?

Endpoint Management · Mobile · VPN

New Ways to Secure Mobile Devices for BYOD

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.