Posts tagged with VPN

hands-coffee-smartphone-technology
Encryption · Endpoint Management · Mobile · VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,...

matrix-434035_1280
Cybersecurity Strategy · Data Security · Encryption · Endpoint Management · VPN

Web of Spies

Ever since Edward Snowden revealed the extent of state-sponsored espionage over the Internet in 2013 businesses have been acutely aware of just how vulnerable data communications are to being...

person-smartphone-office-table
Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

laptop computer
BYOD · VPN

A Look at BYOD in 2016

Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad...

VPN

Open Haus: Seamless Roaming [VIDEO]

Imagine this: You’re sitting on the train, trying to get your work done, when your Wi-Fi connection – not always the most reliable on trains – drops out. Maybe you manage to re-connect in a few...

laptop computer
Endpoint Management · VPN

Endpoint Security: The Cornerstone of the Cybersecurity Puzzle

Some enterprises occasionally fail to realize that many of the differing cybersecurity services available today aren’t optional add-ons but necessary, oftentimes critical, pieces of a complete...

smartphone mobile
VPN

‘Tis the Season: Why Cyberattackers Set their Sights on the Holidays

The holiday shopping season is back again and now in full gear. With Black Friday and Cyber Monday kicking off the annual frenzy, shoppers are already rummaging through department stores or scouring...

Young woman with laptop
IT policy

Cybersecurity Isn’t Generational: Why Millennials May Not Be the Tech Hope of the Future

Of all the assumptions made and beliefs held about millennials, one of the most common is that they’re uniquely tech-savvy. After all, this is the first generation to grow up being exposed first to...

VPN

Open Haus: Central Management [VIDEO]

By any measure, cyber threats against businesses are escalating in both volume and diversity, as the attackers executing these schemes have become more sophisticated and adept at exploiting...

cog
IT policy

Plan, Install and Operate VPN Gateways in Accordance with the BSI’s Basic IT Security Manual

While the core focus of IT administrators may not be security, they are often tasked with looking after network security, leading them to sometimes feel overwhelmed. They might ask themselves: “How do...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK