Post of category Data Security

smart building photo
Cybersecurity Strategy · Data Security · Encryption · Internet of Things · Smart Buildings · Smart City

Smart buildings merit smarter security

Architects and city planners first began promoting the concept of Smart Buildings, or Building Automation Systems (BAS), around ten years ago. Smart buildings were meant to deliver untold benefits...

Data Security · VPN

More anonymity with Tor and VPN?

Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users...

money-256314_1920
Cybersecurity Strategy · Data Security · Encryption · VPN

Trouble in store? Don’t forget VPN

For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were...

big-data-1086802_1920
Data Security · Encryption · Endpoint Management · VPN

Big data, big security questions

Half of enterprises today store sensitive information within big data environments (up from 31 percent in 2015). Influential agencies like ENISA warn there are considerable cyber risks from using big...

NCP WTP Sponsor
Cybersecurity Strategy · Data Security · VPN

NCP sponsors Nürnberger Versicherungscup 2016

NCP’s mission is to help businesses perform at the top of their game through strong and agile remote data communications access. With this in mind it is appropriate that NCP is sponsoring the Women’s...

Data protection
2 Factor Authentication · Cybersecurity Strategy · Data Security

The national economic protection strategy in Germany and real life

When it comes to security, public authorities in any country also want to represent their interests, some more intensively than others. Germany is not lacking in initiatives and organizations that...

Online Data Security Concept
Data Security · Encryption · SSL

SSL: Still Secure When Configured Correctly

The Secure Socket Layer (SSL ) protocol is under attack: in recent months, a succession of vulnerabilities and successful breaches have raised questions about the effectiveness of this ubiquitous...

matrix-434035_1280
Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

Web of Spies

Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

person-smartphone-office-table
Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

person-apple-laptop-notebook
Data Security · Endpoint Management · Wi-Fi

Staying Safe at Wi-Fi Hotspots

Wi-Fi hotspots in coffee shops, hotels, railway stations and airports have become a welcome resource for any business traveler, providing them with a convenient means to carry on working while on the...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK