Posts tagged with hackers

Cybercrime · Data Security

How to Lose User Confidence and Jeopardize Security

Using up-to-date security software is pretty much at the top of recommended defense measures. Anti-virus and anti-phishing software filter out daily attacks from network communications. However, it is...

Remote Access VPNs For Dummies
2 Factor Authentication · VPN

Why Two-Factor Authentication is Too Important to Ignore

Remote Access VPNs For Dummies
Rethink Remote Access · VPN

When Remote Access Becomes Your Enemy

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible. That’s why secure remote access is a component...

Highlights

What We're Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices

Highlights

What We're Reading, Week of 11/5

Government Computer News – NIST spells out baseline security requirements for next-gen mobile devices

Expert Q&A · Troubleshoot · VPN

How can I make sure my VPN is encrypted and working properly?

*Editor’s Note: These columns originally appeared in TechTarget’s SearchEnterpriseWan.com

Highlights

What We’re Reading, Week of 1/2

Help Net Security, Securing Android for the Enterprise

VBN-chains
IT policy · Rethink Remote Access

What You Need to Know about Branch Networking: Central Management

Last week’s post on Branch Networking focused on High Availability, so this week we’ll take a dive into central management. As a quick overview, a central VPN management system is required for...

Gucci
2 Factor Authentication · Industry Commentary · IT policy

The Disgruntled Security Breach Strikes Again

We’ve said it before and we’ll say it again – disgruntled, former employees pose a major risk to your network. If you’ve been following the headlines this week, you know why we’re bringing this up...

cannon
Expert Q&A · Mobile

Conversation with Thomas Cannon on Android Security, Part 2

VPN Haus continues its conversation with Thomas Cannon, a security researcher who made news last month when he discovered a vulnerability on the Android OS that could make devices susceptible to data...