Post of category VPN

Remote Access VPNs For Dummies
Industry Commentary · IT policy · VPN

Industry 4.0: Flexible Production Needs Secure Networking

As we sit on the edge of the fourth industrial revolution, businesses are preparing for sweeping technological changes that will impact their production. Governments around the world, particularly...

Remote Access VPNs For Dummies
Industry Commentary · VPN

No Quick Fixes for Home Depot After Record Cyberattack

Home Depot fixes America's household problems. If you're planning a do-it-yourself project, whether it's repairing a leaky faucet or installing new linoleum flooring, you're probably going to visit a...

Remote Access VPNs For Dummies
IT policy · VPN

It's Time for Retailers to Tell Point-of-Sale Hackers to 'Back Off'

It's Groundhog Day all over again for retailers, following the U.S. Department of Homeland Security's warning that they could, once again, be exploited by malicious actors.

Network Security Battlefield
Endpoint Management · VPN

Poor Communication Leads to Defeat on the Network Security Battlefield

In September 1862, the 27th Indiana Infantry Regiment, situated near Frederick, Maryland, made a discovery that could have altered the Civil War. It all began without much fanfare. Two soldiers...

Endpoint Management · VPN

Are Privileged Users the ‘Weak Link’ in Your Network Security?

If a group is really only as strong as its “weakest link,” then why are so many enterprises, which are otherwise concerned about their network security, so quick to add new “links”? Every new user...

Industry Commentary · VPN

Hacks of Houston Astros, Butler University Put Network Security on Center Stage

Even though the Houston Astros have been the worst team in Major League Baseball for the last three seasons, one of the team's off-the-field accomplishments — its proprietary internal computer...

Endpoint Management · IT policy · VPN

Why a User-Centric Approach is Required for Network Security

Is your enterprise one of the many that are "subject to the whims of fickle consumer-business users" when it comes to adopting new technology?

Endpoint Management · Mobile · VPN

New Ways to Secure Mobile Devices for BYOD

The discussion on BYOD centers on whether employees working more efficiently on their personal devices is worth whatever network security vulnerabilities are sown when enterprises allow numerous...

Industry Commentary · Mobile · VPN

BYOD and Its Risks to Network Security

In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce...

Industry Commentary · IT policy · VPN

Are Your Employees Undermining Your Network Security?

Enterprises are constantly fighting to stay one step ahead of hackers, from upgrading endpoints using the now vulnerable Windows XP to Windows 8 or implementing more secure remote access technologies...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK