Post of category VPN

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

matrix-434035_1280
Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

Web of Spies

Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

person-smartphone-office-table
Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

iot
Cybersecurity Strategy · Internet of Things · VPN

Flaws in Industrial IoT Underline Importance of Secure Connectivity

According to the leading analyst firm Gartner Group over 50% of major new business processes and systems will incorporate some element of the Internet of Things (IoT) by the year 2020. The potential...

Cybersecurity Strategy · VPN

Threat Intelligence-as-a-Service brings SIEM Within Reach of SMEs

Organizations are being targeted by cybercriminals more than ever. According to the latest statistics from Symantec, 52.4% of phishing attacks in December 2015 were against small and medium-sized...

Cybersecurity Strategy · VPN

Back to Basics: Tackling the Fundamental Cybersecurity Solutions [VIDEO]

It’s fair to say that organizations, particularly larger enterprises, are making more concerted efforts nowadays to invest heavily and quickly into cybersecurity. Just a few short years ago,...

laptop computer
BYOD · VPN

A Look at BYOD in 2016

Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad...

VPN

Open Haus: Seamless Roaming [VIDEO]

Imagine this: You’re sitting on the train, trying to get your work done, when your Wi-Fi connection – not always the most reliable on trains – drops out. Maybe you manage to re-connect in a few...

laptop computer
Endpoint Management · VPN

Endpoint Security: The Cornerstone of the Cybersecurity Puzzle

Some enterprises occasionally fail to realize that many of the differing cybersecurity services available today aren’t optional add-ons but necessary, oftentimes critical, pieces of a complete...

smartphone mobile
VPN

‘Tis the Season: Why Cyberattackers Set their Sights on the Holidays

The holiday shopping season is back again and now in full gear. With Black Friday and Cyber Monday kicking off the annual frenzy, shoppers are already rummaging through department stores or scouring...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK