How secure is your software supply chain?
The Log4j vulnerability has demonstrated the importance of supply chain security. In this blog post we consider the best course of action that companies can take to protect their software supply chain.
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
How secure is your software supply chain?
The Log4j vulnerability has demonstrated the importance of supply chain security. In this blog post we consider the best course of action that companies can take to protect their software supply chain.
Endpoint security: An important topic in hybrid work environments
Companies must ensure that endpoint security is given the highest priority. This is especially true for hybrid working environments.
Ransomware attacks: Standing your ground pays off!
Ransomware attacks are particularly cruel: Cyber criminals encrypt data and demand a ransom for its safe release, threatening that they will either delete data to bring a company to its knees or make the data public. For important business data and sensitive, personal ...
The era of passwords is coming to an end
Passwords remain a vulnerability. Multi-factor authentication and time-based one-time passwords can help to enhance password security and shut out attackers.
How 2FA works with time-based one-time passwords
Passwords are not strong enough: 2FA and time-based one-time passwords (TOTP) enhance security Plus: Online services that already support TOTP.
How to switch to two-factor authentication the easy way
Two-factor authentication (2FA): What you need to know before activating 2FA and what to back up.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.