Post of category Cybersecurity Strategy

password
2 Factor Authentication · Cybersecurity Strategy · Data Security

Authentication on PCs: Recommendations from Security Experts

Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

hier nicht weiter
2 Factor Authentication · Cybersecurity Strategy · VPN

Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

work
Cybercrime · Cybersecurity Strategy · VPN

Awareness is crucial - How to prevent e-mail fraud

Sometimes it’s hard to believe the stories we read. In the case of CEO fraud incidents, cybercriminals earn double-digit sums in the millions by persuading employees that they are acting on behalf of...

smartphone
Cybercrime · Cybersecurity Strategy · Mobile · VPN

The risk of attack is getting closer – mobile devices in focus

Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for...

pexels-photo-401684
BYOD · Cybersecurity Strategy · Data Security · VPN

Top Business Benefits of VPNs

President Donald Trump’s recent decision to overturn moves by the Obama administration to stop Internet service providers (ISPs) from selling everyone’s browsing data to advertisers and other third...

pexels-photo (1)
Cybersecurity Strategy · Privacy · VPN

Secret role of VPNs in the health and safety of spacecraft

Every day, dozens of man-made probes and satellites travelling through space are in constant communication with their mission headquarters on earth.

pexels-photo-238480
Cybersecurity Strategy · Public Hotspot · VPN · Wi-Fi

Simple steps to a secure public hotspot connection

In just a short time, our working lives have been transformed. 

rsa-conference-image_full-size
Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

Security
Cybersecurity Strategy · Internet of Things · VPN

A priority on today’s to do list: Please secure remote access once and for all!

Most IT devices have some form of remote access, whether via web browser or app. As long as devices are accessed by an authorized user from within an internal network, this isn’t a problem....

pexels-photo-96612
Cybersecurity Strategy · Internet of Things · VPN

Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems

Energy plants and factories have always been prime targets for delivering a devastating setback and psychological blow against an enemy.

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK