Companies are now investing a lot of time and money in securing sensitive information. This is a welcome change, even if these efforts are not always consistent or in the right place.
Posts of category: IT Security
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
Beat Unintended Consequences of GDPR with VPNs
When EU General Data Protection Regulation (GDPR) was introduced in May 2018, it was supposed to give citizens more control over their online data. Companies had to tell consumers how their personal data would be stored and obtain consent to use it.
U.S. Moves to Track Cryptocurrency Transactions
Staying safe while online remains a major concern for most Internet users. Companies of all sizes and across all industries are taking whatever steps necessary to keep their employees safe and protect sensitive data.
Mobile devices need protecting too
Attacks on or by end devices that are not on the company premises happen again and again. A VPN is important and indispensable for remote connections to the corporate network, but it is only half the battle.
Europe’s Smart Cities Put Citizens’ Privacy First
For more than a decade, public authorities around the world have been quietly adding many thousands of remote digital sensors to urban infrastructures.
What "state of the art" means in IT security today
State-of-the-art is an expression used frequently but what does it mean? It is intended to express that current technology is being used but this implicitly excludes visionary technology. Often the term is used to as a line of defense to show compliance with standards
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.