Almost everyone in business has reason to be grateful for the existence of SWIFT. SWIFT (the Society for Worldwide Interbank Financial Telecommunications system) is the international banking and funds transfer network that allows you to quickly send and receive money to or from ...
Posts of category: VPN
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Smart cities must respect privacy at heart
“Between the mind that plans and the hands that build there must be a Mediator, and this must be the heart.” This famous line from Germany's 1927 masterpiece, Metropolis, continues to resonate today. With the rise of the Internet of Things (IoT) the concept of smart cities is ...
Side-step the Internet censorship threat
Most people in the Western world regard privacy as one of most fundamental rights in a democratic society. They also take it for granted that these democratic principles apply equally to the Internet.
VPNs can ease privacy concerns
High profile data breaches at companies like Mossack Fonseca, Target, Home Depot and Wendy’s along with Government controversies like Edward Snowden and the FBI’s legal suit against Apple after the San Bernadino shootings have severely dented public confidence in the ability of ...
More anonymity with Tor and VPN?
Tor (The Onion Router) is one of the most important tools for anonymity on the Internet. The Tor network, protocol and client, make it extremely complicated to trace user activity. However, Tor users are not completely invisible.
Trouble in store? Don’t forget VPN
For a couple of years now security breaches in the retail sector have seldom been out of the headlines. Breaches at large retail chains like Target, Neiman Marcus and The Home Depot in 2014 were followed in 2015 by Dungarees, Starbucks, CVS, Toys R Us and Wallmart Canada.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.