Post of category Cybersecurity Strategy

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Getting IT security priorities right

Information security should protect the company's important assets, be transparent, unobtrusive and always up-to-date, and of course cost nothing. There is not a magic formula to achieve all this but...

Connected Cars · Cybersecurity Strategy · Data Security

Connected Car Data Privacy Goes on Trial

Modern cars know more about us than we might imagine. From driving habits to information about places we’ve visited and even our music tastes, much of the information our cars gather every day is very...

Cybersecurity Strategy · Data Security

No more passwords, please!

The password is probably the best known concept in computing. Probably you will only find people who don't know the word in the most remote areas around the globe. Even the Romans were known to use...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · Industry Commentary · Internet of Things

Customer Survey Highlights Secure IoT Communications and Reliable Technical Support from NCP engineering

With the rise of IoT devices in the workplace, it is becoming increasingly important for companies to build secure IoT structures. Secure networking is business-critical for enterprises, service...

Cybercrime · Cybersecurity Strategy · Data Security · Internet of Things

Risk to Business Travelers’ Data Grows

Business travel is a fertile hunting ground for hackers. Sensitive company data is seldom more at risk than when employees are on the road. The travel sector is notoriously susceptible to large scale...

Cybercrime · Cybersecurity Strategy · Data Security

A risky business: what happens when transferring risk goes wrong?

The title of this article might seem a little confusing so let's start by breaking things down. Once a risk analysis has been conducted and the risks facing a company have been identified, for example...

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Tech Giants Talk the Data Privacy Talk

The reputation of Silicon Valley’s elite brands is in urgent need of repair. In recent years, data scandals from breaches of personal information to alleged interference with democratic elections...

Cybercrime · Cybersecurity Strategy · Data Security

ECSM 2019 – Cyber security affects us all

Cyber security has many facets and affects all areas of our digital lives, both professional and private. In some environments, information security is mandatory where regulatory requirements foresee...

Blog · Cybersecurity Strategy · Data Security · Encryption

Pressure Grows on Banks to Improve Data Privacy Protection

News that Facebook is to introduce a crypto currency has put banking regulators worldwide on red alert. On the surface, the move by tech giants into financial services is good for customers....

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Voice-Assisted Shopping Calls for Security by Design

For the past two decades, the retail sector has had to wrestle with constant change. Successive technologies have effectively turned the industry on its head. Today’s chains arguably set more store...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK