Beiträge aus der Kategorie: Cybersecurity Strategy

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management

Security basics for the cloud

More and more companies are using public cloud computing resources for their IT requirements. Companies often test the water first with pilot projects to explore how cloud computing could work in...

Cloud · Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things

Top Cloud Security Risks for Healthcare

Healthcare already has some of the most varied and complicated IT environments of any industry. Telemedicine, gene sequencing, patient electronic healthcare records (EHRs), radiology and digital...

Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

Five Common Problems with Consumer VPNs

The recent Facebook debacle and other data privacy scandals have fueled a rising interest in virtual private network (VPN) software among consumers. Many people have adopted them for protecting their...

Cybersecurity Strategy · Data Security · Internet of Things

Cloud-Based Remote Access Becomes Pivotal to Managing IIoT Security

Industrial Revolution 4.0 has fundamentally changed how manufacturing systems are managed. Highly-specialized operational technology (OT) is now being joined up with Industrial Internet of Things...

Blog · Cybersecurity Strategy · Data Security

Tech Privacy Moves Center Stage

The repeated failure of social media companies to properly protect personal data has so undermined consumer confidence that most people now believe total privacy is impossible in the modern digital...

Cybersecurity Strategy · Data Security · Digital Signage · Encryption · Internet of Things

Facial Recognition Raises Security Stakes on Digital Signage

Facial recognition software is being embedded in digital signage to deliver a more personalized audience experience. The medium is already a target for cyber attackers and mischief makers. Adding...

Cybercrime · Cybersecurity Strategy · Data Security

Through the back door

Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place. Unfortunately...

Cybersecurity Strategy · Data Security · Endpoint Management

Mobile devices need protecting too

Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the...

Cybersecurity Strategy · Data Security

What "state of the art" means in IT security today

State-of-the-art is an expression used frequently but what does it mean? It is intended to express that current technology is being used but this implicitly excludes visionary technology. Often the...

BYOD · Cybersecurity Strategy · Data Security · Encryption · Internet of Things

The Spy in Your Pocket

From apps that know our every move, to cookies that track each browsing session and large scale social media privacy breaches – our smartphones are constantly spying on us. These days, most people...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK