Posts tagged with VPNs

Cybersecurity Strategy · Data Security

Addressing Cryptocurrency Trading Security Issues

Cryptocurrency trading has been gathering pace over the past few years and has been compared to the American Wild West. Early adventurers have faced tremendous risks in terms of extreme market...

Blog · Data Security · Encryption · Endpoint Management · Internet of Things

What does built-in IIoT security look like?

What Does Built-in IIoT Security Look Like? Companies are racing to take advantage of new revenue opportunities, operational efficiencies and cost savings offered by the multitude of IP-connected...

Blog · Cybersecurity Strategy · Data Security · Encryption

To Succeed, Open Banking Must First Allay Privacy Concerns

The banking industry in the UK and the rest of Europe is undergoing a quiet revolution. Under new rules, EU banks must share the data of consenting customers with third parties. Designed to increase...

Blog · Cloud · Data Security · VPN

Key risks for enterprises committing sensitive data to the cloud

Economic benefits of migrating enterprise IT environments to services providers are starting to outweigh the security concerns hovering over cloud computing. Until recently, organizations have...

Cybersecurity Strategy · Data Security · Endpoint Management · Internet of Things · IT policy · Privacy · VPN

Top Concerns for Digital Assistants in the Workplace

Digital assistants like Amazon’s Alexa/Echo, Apple Homekit and Google Home are increasingly becoming part of the connected home. The Alexa for Business Platform, announced at the end of 2017, is set...

Data Security

Extended Mass Surveillance Increases Pressure to Keep Data Comms Private

Congress has approved a six-year extension of Section 702 of the U.S. surveillance law. This means the continuation of PRISM, the controversial mass surveillance program first exposed by Edward...

Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

The Three Human Failures Behind Remote Access Shortcomings
IT policy · Rethink Remote Access · VPN

The Three Human Failures Behind Remote Access Shortcomings

Whenever news of a network security breach reaches the public airwaves, observers are quick to assign blame to some combination of technological shortcomings and human error that allowed an attacker...

Dollar Bill
Endpoint Management · Industry Commentary

Who Will Foot the Bill for BYOD?

The concept of "Bring Your Own Device" seems so simple. Employees can just tote their personal phone or tablet with them to the office – which they're probably doing anyway – and use it for work. Or,...

Endpoint Management · IPsec · Mobile · SSL · VPN · Wi-Fi

Vehicle VPNs, Part Two: Business World Implications

In recent years, remote access security has become a major focus of IT departments in businesses small and large. The rapid growth in the use of smartphones and tablet computers, the...