Posts tagged with mobile devices

Cybersecurity Strategy·Data Security·Internet of Things·IT policy·VPN

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files…

Cybercrime·Cybersecurity Strategy·VPN

The risk of attack is getting closer – mobile devices in focus

Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for…

Remote Access VPNs For Dummies

When Remote Access Becomes Your Enemy

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible. That’s why secure remote access is a component…

IPv6: Looking Back on Year One

It was only one year ago that the world welcomed the launch of IPv6, the long-anticipated solution to the problem of the world running out of IP addresses.


Expert Q&A: Preventing Mobile Hacking: Must You Take Precautions?

*Editor’s Note: This column originally appeared in TechTarget’s 

Industry Commentary·IT policy·VPN

VPNs Enable Desktop Virtualization

By Bernd Reder

Industry Commentary·IT policy·VPN

Webinar: What CIOs and CTOs Need to Know About Mobile Device Security

Rainer Enders, CTO, Americas at NCP engineering, recently conducted an Execsense webinar around what CIOs and CTOs need to know about mobile device security. Rainer explains how the replacement of…

Industry Commentary

Forward Thinking: Network Security Predictions for 2013

The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks…

IT policy

How Can I Ensure App Store Security for my Remote Users?

*Editor’s Note: This column originally appeared in TechTarget’s

What We're Reading, Week of 11/19

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain VulnerabilitiesMidsize Insider  – IT Security Threats: The Predictive Problem SearchCloudApplications – Mobile cloud trends:…