Post of category Cybersecurity Strategy

Cybercrime · Cybersecurity Strategy · Data Security

Through the back door

Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place. Unfortunately...

Cybersecurity Strategy · Data Security · Endpoint Management

Mobile devices need protecting too

Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the...

Cybersecurity Strategy · Data Security

What "state of the art" means in IT security today

State-of-the-art is an expression used frequently but what does it mean? It is intended to express that current technology is being used but this implicitly excludes visionary technology. Often the...

BYOD · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

The Spy in Your Pocket

From apps that know our every move, to cookies that track each browsing session and large scale social media privacy breaches – our smartphones are constantly spying on us. These days, most people...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things

Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

Cybercrime · Cybersecurity Strategy · Data Security

The difference between awareness and action

Do you remember Equifax? Maybe in combination with the word "hack"? The Equifax hack in September 2017 was one of the most momentous attacks in recent history. The hackers stole about 143 million...

Cybersecurity Strategy · Data Security

People’s Online Privacy Protection Matters

The pressure on social media companies to ensure better privacy protection for users looks set to become a recurring hot button in 2019. News of data leaks and information breaches continue to dog...

Cybersecurity Strategy · Data Security · Internet of Things

Managing IIoT Authentication

The market for Industrial Internet of Things (IIoT) equipment is growing rapidly. Before long, the installed base of smart industrial machines will exceed the number of remote workers. However,...

Cybercrime · Cybersecurity Strategy · Data Security

State intervention – Rescue or ruin?

In recent months, a number of government agencies have been campaigning for state intervention in IT security. This includes an initiative to enforce a minimum level of security for home and small...

Cybersecurity Strategy · Data Security · Encryption

Local Laws Start to Fragment Privacy Picture

For well over a decade, the leading technology companies have been able to build hugely profitable businesses on the back of people’s personal data. Now, for the first time, serious questions are...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK