Posts tagged with Mobile Security

Cybercrime·Cybersecurity Strategy·Data Security·Encryption

Online Shopping this Holiday Season? Here's How to Stay Protected

With the holiday season in full swing, retailers and e-commerce stores are once again competing with the lowest prices and best bargain deals to draw in new customers and increase sales. Nearly 190…

BYOD·Cybersecurity Strategy·Data Security·Encryption·Internet of Things

The Spy in Your Pocket

From apps that know our every move, to cookies that track each browsing session and large scale social media privacy breaches – our smartphones are constantly spying on us. These days, most people…

smartphone
Cybercrime·Cybersecurity Strategy·Mobile·VPN

The risk of attack is getting closer – mobile devices in focus

Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for…

pexels-photo-129632
Data Security·Mobile

Is Mobile Security Broken?

The way we work has changed. No longer tied to our desks, our laptops, tablets and smartphones let us do our job from wherever we want – at the office, at home or even while on-the-move. We can also…

NCP WTP Sponsor
Cybersecurity Strategy·Data Security·VPN

NCP sponsors Nürnberger Versicherungscup 2016

NCP’s mission is to help businesses perform at the top of their game through strong and agile remote data communications access. With this in mind it is appropriate that NCP is sponsoring the Women’s…

hands-coffee-smartphone-technology
Encryption·Endpoint Management·Mobile·VPN

Mobile payments and security -- money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time,…

Modern working desk with digital tablet
Rethink Remote Access·VPN

Seamless Roaming or Always On: The Remote Access VPN Feature Digital Nomads May Be Missing

In remote working environments, the Digital Nomad isn't tied to a desk or cubicle, but he has close relationships with his coworkers. The Digital Nomad works exclusively from mobile devices that…

Techconsult Logo
Rethink Remote Access·Uncategorized·VPN

NCP engineering Earns 'Champion' Rating in techconsult Report

This year, cyberattacks are expected to rain down at a rate of more than 117,000 per day, adding up to more than 42.8 million total incidents. As these attacks are launched and subsequently…

Wi-Fi Hotspot
Mobile·VPN

Open Haus: Automatic Hotspot Logon

If you were a hacker targeting a network, which would be most appealing – a network contained in a residential building, an office or corporate facility, or a public place?

Endpoint Management

Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

By now, cybersecurity veterans are well-versed in the most common attack vectors exploited by hackers to breach their corporate networks. Brute force attacks, phishing schemes, SQL injections –…