Which IT security solutions can companies still trust? Read about how switching vendors minimizes the risks of backdoors and kill switches.
Passwords are not strong enough: 2FA and time-based one-time passwords (TOTP) enhance security Plus: Online services that already support TOTP.
Today we’ll be tackling another myth about VPN. I’ll also touch on security protocols and what role they play in VPN. Today's myth is: “All VPNs offer the same protection.”
Two-factor authentication (2FA): What you need to know before activating 2FA and what to back up.
As we probably already know, innovation can take different forms: Either as continuous and incremental renewal or through disruption and shock. This second form of innovation involves risks and uncertainties, fundamentally changes processes and procedures and can lead to high ...
It’s time for another Tobi’s take on secure communications. Now that I hope you know what a Virtual Private Network (VPN) is, today I would like to go into more depth on the myths about VPN today and I’ll also be picking up on this again in my next posts.
VPNaaS has many benefits compared to a classic VPN, as it protects both local resources and cloud applications – and at a lower cost.
Please select a year.