Protecting Mobile Data Privacy in the Enterprise

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature. They will very likely use them to check work emails, download files containing customer information or access privileged network content remotely without a second thought. Unfortunately, accessing information in this way is ... Read More
Meltdown and Spectre – play down or panic?

Meltdown and Spectre – play down or panic?

Users have long since accepted that software errors can be exploited for digital attacks. In fact, these have become so frequent that only highly critical incidents make the news. Hardware is mostly a different story and not often considered as a security threat. But now the Meltdown and Spectre security ... Read More
Keeping Industrial Revolution 4.0’s Treasures Hidden

Keeping Industrial Revolution 4.0’s Treasures Hidden

The growing use of Industrial Internet of Things (IIoT) worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth industrial revolution, or Industry 4.0 for short. Big things are expected. Analysts at Gartner expect manufacturing to ... Read More
Looking into the crystal ball

Looking into the crystal ball

In 2017, some of the worst data incidents of recent years have occurred. Whether Equifax, Uber or Maersk, organizations have had to admit, sometimes too late, that their customers’ personal data have been stolen. To some extent, companies' tactics to cover up the incidents have seemed almost as criminal as ... Read More
Could Net Neutrality reversal spell open season for connected car data?

Could Net Neutrality reversal spell open season for connected car data?

The U.S. Federal Communications Commission (FCC) has voted to overturn Net Neutrality. The decision gives internet service providers (ISPs) and telecom companies the right to prioritize services according to customers’ ability to pay and to sell customer data to third parties. One industry likely to feel the effect of this ... Read More
Christmas is coming – but turn off the Wi-Fi

Christmas is coming – but turn off the Wi-Fi

Every year, as Christmas draws nearer, many can be heard questioning the sanity of annual gifting madness. In the past, everything was better when the parents themselves were children and most were happy with a wooden car. Today's children are far too spoiled anyway. But if you think the favorite ... Read More
Four Common Myths about VPNs

Four Common Myths about VPNs

A Virtual Private Network (VPN) is a useful tool that encrypts data before it passes across the public Internet and then decrypts it when it reaches its destination. Rather like shutters on the windows of a house, it shields what goes on inside even though the outside can be seen ... Read More
GDPR: Who is responsible for what?

GDPR: Who is responsible for what?

The EU General Data Protection Regulation (GDPR) and the Network Information Security (NIS) directive are already causing a flurry of activity among businesses. Who is ultimately responsible for cybersecurity seems to be attracting particularly intense discussion. According to a recent study by Palo Alto Networks, cybersecurity is usually the responsibility ... Read More
Regulation for IIoT is on its way – but is it enough?

Regulation for IIoT is on its way – but is it enough?

Two of the biggest technology trends today - IoT (Internet of Things) and M2M (machine-to-machine) communications - are changing the business world beyond all recognition. Companies of all sizes, from major manufacturers to small-and medium-sized services companies from all sectors, now have a golden opportunity to derive new revenue streams ... Read More

Business Benefits of Staying Anonymous Online

/ / Data Security, IT policy, VPN, Wi-Fi
A new report from UK anti-fraud organization Cifas shows identity theft at "epidemic levels". From the present controversy over Net Neutrality to the openness of public Wi-Fi, personal information has seldom been more exposed. The Internet’s susceptibility to surveillance and cyber attacks compromises privacy, leading to concern in some quarters ... Read More
Loading...