Post of category Cybersecurity Strategy

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

Cybersecurity Strategy · Data Security · Internet of Things · Privacy

Looking into the crystal ball

In 2017, some of the worst data incidents of recent years have occurred. Whether Equifax, Uber  or Maersk, organizations have had to admit, sometimes too late, that their customers’ personal data have...

vpn
Cybersecurity Strategy · Encryption · Endpoint Management · IT policy · VPN

Four Common Myths about VPNs

A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the...

pexels-photo-208703
Cybersecurity Strategy · Internet of Things · Privacy · Smart Buildings · VPN

Regulation for IIoT is on its way – but is it enough?

Two of the biggest technology trends today - IoT (Internet of Things) and M2M (machine-to-machine) communications - are changing the business world beyond all recognition.

password
2 Factor Authentication · Cybersecurity Strategy · Data Security

Authentication on PCs: Recommendations from Security Experts

Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

hier nicht weiter
2 Factor Authentication · Cybersecurity Strategy · VPN

Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

work
Cybercrime · Cybersecurity Strategy · VPN

Awareness is crucial - How to prevent e-mail fraud

Sometimes it’s hard to believe the stories we read. In the case of CEO fraud incidents, cybercriminals earn double-digit sums in the millions by persuading employees that they are acting on behalf of...

smartphone
Cybercrime · Cybersecurity Strategy · Mobile · VPN

The risk of attack is getting closer – mobile devices in focus

Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for...

pexels-photo-401684
BYOD · Cybersecurity Strategy · Data Security · VPN

Top Business Benefits of VPNs

President Donald Trump’s recent decision to overturn moves by the Obama administration to stop Internet service providers (ISPs) from selling everyone’s browsing data to advertisers and other third...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK