Posts of category: Endpoint Management

Data Security·Endpoint Management

Time for stable and secure VPN

Market researchers are reporting divided opinion on the pros and cons of remote working. While some research reports an overwhelming majority of employees as die-hard remote working fans who never…

2 Factor Authentication·Data Security·Endpoint Management

Remote access with privileges: Not all VPN accounts are equal

With surprising efficiency, large parts of the economy in Germany and other countries have switched employees from working in offices to working at home. Teams, Zoom, Jitsi and other tools have taken…

2 Factor Authentication·Data Security·Endpoint Management

The long but right way to two-factor authentication

It is 2020 and accounts which contain valuable and private data can still be created without two-factor authentication. However, it might be some consolation that this is happening less and less. And…

Cybercrime·Cybersecurity Strategy·Data Security·Encryption·Endpoint Management

The Worst Data Breaches of 2019

Another day, another data breach. With more than five thousand data breaches and over seven billion records exposed, 2019 was the worst year on record for breach activity. According to research from…

Cybersecurity Strategy·Data Security·Endpoint Management

Apple macOS Catalina: Plenty of new features and a spotlight on security

The current major release of macOS, Catalina was announced recently. As ever with Apple, the list of changes is very long and ranges from using an iPad as a second screen (SideKick) to the…

Data Security·Endpoint Management·Internet of Things

Industrial control systems still at risk

While security incidents involving ransomware and  data breaches  have have received much media attention, incidents in the industrial control sector rarely make the headlines. We hear so little, you…

Cybersecurity Strategy·Endpoint Management

Cyber Security Month – Reason to celebrate?

This October is time again for the European Cyber Security Month (ECSM), an initiative which is managed by the European Union. During the campaign which lasts throughout the month, the EU aims to…

Cybersecurity Strategy·Data Security·Encryption·Endpoint Management

Getting IT security priorities right

Information security should protect the company's important assets, be transparent, unobtrusive and always up-to-date, and of course cost nothing. There is not a magic formula to achieve all this but…

Cybersecurity Strategy·Data Security·Encryption·Endpoint Management·Industry Commentary·Internet of Things

Customer Survey Highlights Secure IoT Communications and Reliable Technical Support from NCP engineering

With the rise of IoT devices in the workplace, it is becoming increasingly important for companies to build secure IoT structures. Secure networking is business-critical for enterprises, service…

Cloud·Data Security·Endpoint Management

More trouble in the cloud

If you leave out Germany – which is well-known for taking a strict approach to privacy concerns, cloud growth figures are impressive. This year, cloud service revenue is expected to reach USD 212…