Beiträge aus der Kategorie: Data Security

laptop-mobile
Data Security · IT policy · VPN · Wi-Fi

Business Benefits of Staying Anonymous Online

A new report from UK anti-fraud organization CIFAS shows record levels of identity theft.

pexels-photo-59519
Data Security · Internet of Things · Mobile · Public Hotspot · VPN · Wi-Fi

Going on Holiday? Don’t Forget to Pack Your VPN

People have become accustomed to using their mobile devices for the dual purposes of business and leisure.

pexels-photo-401684
BYOD · Cybersecurity Strategy · Data Security · VPN

Top Business Benefits of VPNs

President Donald Trump’s recent decision to overturn moves by the Obama administration to stop Internet service providers (ISPs) from selling everyone’s browsing data to advertisers and other third...

macbook-apple-imac-computer-39284
BYOD · Data Security · Endpoint Management · Internet of Things · Mobile · VPN

Enabling Secure Remote Connectivity for Apple Devices

With over one billion active users worldwide, Apple continues to offer the most diverse product line from Apple Watches to Macs, to iPads and iPhones.

Data Security · Privacy · VPN

Winner Takes It All: Why Net Neutrality is a High Stakes Game

Right now, there’s an almighty tussle going between the telcos and the Internet giants over changes to Net Neutrality rules.

Cybercrime · Data Security

The next major incident is simply a matter of time

When WannaCry dominated the headlines, manufacturers fell over one another to make a statement. On the whole, the comments can be divided into two groups. Some reminded customers that not patching...

money-card-business-credit-card-50987
Cybercrime · Data Security · Internet of Things · VPN

Older ATMs Under Fire as IoT Starts to Bite

 

globe data lock
Data Security · VPN

The EU General Data Protection Regulation

Data protection is going to get expensive: The EU General Data Protection Regulation is on its way.

Data protection
Cybercrime · Data Security · VPN

The ten most serious cyber crimes and data breaches to date

People are often quick to adapt – now we don’t seem to blink an eyelid when we read news about another hacked server and the loss of a few million records of personal data. Only the most spectacular...

2 Factor Authentication · Cybersecurity Strategy · Data Security

Top 5 security vulnerabilities are always the same

The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK