Post of category Endpoint Management

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

What Will 5G Mean for Data Privacy?

President Trump’s decision to blacklist Huawei has thrust next-generation 5G data communications suddenly into the media spotlight. The Chinese telecommunications giant currently leads the world in...

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management

Security basics for the cloud

More and more companies are using public cloud computing resources for their IT requirements. Companies often test the water first with pilot projects to explore how cloud computing could work in...

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things

Top Cloud Security Risks for Healthcare

Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Five Common Problems with Consumer VPNs

The recent Facebook debacle and other data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them for protecting their...

Cybersecurity Strategy · Data Security · Endpoint Management

Mobile devices need protecting too

Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

Industry Perspectives: The Convergence of IT and OT Enhances Security for the Industrial Internet of Things

Traditionally, information technology (IT) and operational technology (OT) have played separate roles within organizations. Now, with the emergence of the Industrial Internet of Things and the...

Cybercrime · Cybersecurity Strategy · Data Security · Endpoint Management

Urgent, Important or Both: Setting Priorities in IT Security

The fight against cyber threats is often described as an arms race. One side finds new attack vectors, the other side responds with new defense strategies. However, this suggests a greater sense of...

Cloud · Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things

The Prize for Smart Cities is to Secure a Sustainable Future

At the beginning of October, the Intergovernmental Panel on Climate Change (IPCC) issued its special report on the impact of climate change. The report contains grim warnings for politicians worldwide...

Cybercrime · Endpoint Management

Security risk through USB cable attacks

USB has brought many benefits to computer users. Actually, the inventors and companies involved should be awarded medals. Tangles of cables with incompatible plugs, sockets and formats have steadily...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Endpoint Management · Internet of Things · IT policy · VPN

Connecting IIoT Security and Remote Access to Bridge the Gap Between Operational IT and Product/Production IT

In many industries, technology is developing faster than the ability to secure it. As the Industrial Internet of Things (IIoT) permeates finance, retail, logistics, telecommunications, and healthcare...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK