Post of category Cybersecurity Strategy

pexels-photo-238480
Cybersecurity Strategy · Public Hotspot · VPN · Wi-Fi

Simple steps to a secure public hotspot connection

In just a short time, our working lives have been transformed. 

rsa-conference-image_full-size
Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

Security
Cybersecurity Strategy · Internet of Things · VPN

A priority on today’s to do list: Please secure remote access once and for all!

Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

pexels-photo-96612
Cybersecurity Strategy · Internet of Things · VPN

Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems

Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.

2 Factor Authentication · Cybersecurity Strategy · Data Security

Top 5 security vulnerabilities are always the same

The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

Cybersecurity Strategy · Encryption · VPN

Lack of encryption is putting customer data at risk

Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption.  If this proves true, then many more organizations may be putting customer...

business-cash-coin-concept-41301
Cybersecurity Strategy · Encryption · VPN

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, first entered circulation in 2009. Though users are only just beginning to scratch the surface of its full potential, Bitcoin is...

pexels-photo-186613
Cybersecurity Strategy · Internet of Things · VPN

Making IIoT Security More Robust

The Christmas season is upon us and retailers are excitedly stocking their shelves.  Once again, Internet-connected consumer gadgets, or Internet of Things (IoT) devices, are expected to be among...

Bundesadler_s
Cybersecurity Strategy · VPN

Vote of confidence for IT security made in Germany

Where is your IT manufacturer based? What used to be a trivial matter of image has now become a security issue. Three years after Edward Snowden's revelations, CEOs understandably feel uncomfortable...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK