2017

Cybersecurity Strategy · Data Security · Internet of Things · Privacy

Looking into the crystal ball

In 2017, some of the worst data incidents of recent years have occurred. Whether Equifax, Uber  or Maersk, organizations have had to admit, sometimes too late, that their customers’ personal data have...

Connected Cars · Internet of Things · Privacy · VPN

Could Net Neutrality reversal spell open season for connected car data?

The U.S. Federal Communications Commission (FCC) has voted to overturn Net Neutrality. The decision gives internet service providers (ISPs) and telecom companies the right to prioritize services...

Data Security · Internet of Things · Privacy · Wi-Fi

Christmas is coming – but turn off the Wi-Fi

Every year, as Christmas draws nearer, many can be heard questioning the sanity of annual gifting madness. In the past, everything was better when the parents themselves were children and most were...

vpn
Cybersecurity Strategy · Encryption · Endpoint Management · IT policy · VPN

Four Common Myths about VPNs

A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...

Data Security · Privacy

GDPR: Who is responsible for what?

The EU General Data Protection Regulation (GDPR) and the Network Information Security (NIS) directive are already causing a flurry of activity among businesses. Who is ultimately responsible for...

pexels-photo-208703
Cybersecurity Strategy · Internet of Things · Privacy · Smart Buildings · VPN

Regulation for IIoT is on its way – but is it enough?

Two of the biggest technology trends today - IoT (Internet of Things) and M2M (machine-to-machine) communications - are changing the business world beyond all recognition.

Cybercrime · Data Security

How to Lose User Confidence and Jeopardize Security

Using up-to-date security software is pretty much at the top of recommended defense measures. Anti-virus and anti-phishing software filter out daily attacks from network communications. However, it is...

pexels-photo-169647
Data Security · Internet of Things · Smart Buildings · VPN

Smart buildings need cyber-resilience built-in

Internet of Things (IoT) and machine learning are coming together to bring about a sea change in how we use buildings, at home and in the office.

8cbc7556da1d423dab23285c79460057_18
Data Security · Privacy · VPN

Importance of a Secure Defense for the World Cup in Russia

Major sporting events are always popular with businesses.

password
2 Factor Authentication · Cybersecurity Strategy · Data Security

Authentication on PCs: Recommendations from Security Experts

Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK