Double extortion ransomware: a growing threat to businesses
Double Extortion – first data theft, then encryption. Discover how to protect your company from the dual threat of ransomware extortion.
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
Double extortion ransomware: a growing threat to businesses
Double Extortion – first data theft, then encryption. Discover how to protect your company from the dual threat of ransomware extortion.
IPsec VPN vs. SSL VPN: Choosing the right solution for your business
IPsec VPN delivers advanced security at the network layer. Discover the key advantages of IPsec VPNs over SSL VPNs, especially for hybrid work environments and Zero Trust architectures.
Shadow AI: How AI tools are compromising company data
ChatGPT and other AI tools are sneaking their way into companies and threatening data security and compliance. Learn how to protect your company from Shadow AI.
How deepfake attacks threaten your identity management
Deepfake CFO loots millions: Learn how authentication practices and Zero Trust architectures protect your IAM from AI fraud.
SIEM and SOAR: Which system does your business need?
The perfect combination for enhanced IT security in your business: SIEM detects cyber threats, SOAR automatically fends them off.
Hybrid Work Security: Making remote work more secure
Remote working requires a modern security strategy. Discover how VPN solutions with SD-WAN, SASE, and Zero Trust optimally secure distributed teams and data.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.