2015

Open Haus: Seamless Roaming [VIDEO]
Imagine this: You’re sitting on the train, trying to get your work done, when your Wi-Fi connection – not always the most reliable on trains – drops out. Maybe you manage to re-connect in a few...

Endpoint Security: The Cornerstone of the Cybersecurity Puzzle
Some enterprises occasionally fail to realize that many of the differing cybersecurity services available today aren’t optional add-ons but necessary, oftentimes critical, pieces of a complete...

Open Haus: Multi-Factor Authentication [VIDEO]
NCP has been present at a number of industry events throughout the year, from it-sa in Nuremberg to SC Congress in New York to INTERFACE in Denver. While these gatherings offer great opportunities for...

Does Bringing an ’Ethical Hacker’ In House Pay Off?
A study last year estimated that the global losses from cybercrime ranged from $375 to $575 billion – for just 2014 alone. This figure is only expected to get higher with each passing year as...

‘Tis the Season: Why Cyberattackers Set their Sights on the Holidays
The holiday shopping season is back again and now in full gear. With Black Friday and Cyber Monday kicking off the annual frenzy, shoppers are already rummaging through department stores or scouring...

Missing the Forest for the Trees: How Cyberattacks in the News Can Mask the Threat to SMBs [VIDEO]
Cyberattacks and data breaches have been making headlines more and more these last few years. Whether it was the 40 million customer credit and debit cards stolen from Target in 2013, the major email...

Cybersecurity Isn’t Generational: Why Millennials May Not Be the Tech Hope of the Future
Of all the assumptions made and beliefs held about millennials, one of the most common is that they’re uniquely tech-savvy. After all, this is the first generation to grow up being exposed first to...

Open Haus: Central Management [VIDEO]
By any measure, cyber threats against businesses are escalating in both volume and diversity, as the attackers executing these schemes have become more sophisticated and adept at exploiting...

What’s in a Name? The ABCs of Mobile Device Management
BYOD? CYOD? Given the slew of acronyms flying around mobile device management (which, of course, goes by the acronym “MDM”), you’d be forgiven for losing track of what some of these actually stand...

As the Dust Settles: The Value of Secure Remote Access in the Hours After a Cyberattack
The first 24 hours after a cyberattack are chaotic. The investigations and conclusions will come far down the road, but in the immediate aftermath of an attack, the entire organization is in...