Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems
In the past, the only way to do this was to drop bombs on them. Today, attacks against critical infrastructure can be just as disruptive when launched in cyberspace.
Secure, flexible, scalable: VPN infrastructure is essential in modern IT environments and not just to support the trend towards remote working in an increasingly connected world. Sophisticated endpoint policies can help companies to protect their infrastructure from cyber threats. Security features such as two-factor authentication can also provide additional security, both in consumer and professional environments. Innovations in communication technology and secure remote access have established entirely new sectors such as Industrial Control, Smart City or Edge applications. Stay up to date with our comprehensive news coverage and background reports on the latest VPN developments.
Careful Connections are Key to Mitigating Cyber-Attacks on IIoT Systems
In the past, the only way to do this was to drop bombs on them. Today, attacks against critical infrastructure can be just as disruptive when launched in cyberspace.
Mitigating Retail Vulnerabilities
Retailers are top targets for cybercriminals. According to the 2016 Global Threat Intelligence Report from NTT Group, they receive up to three times the number of attacks as financial institutions - who are next on the list.
Internet of things products are small, networked and unfortunately have almost always little or no security. Sometimes this is down to a lack of willingness by the manufacturer but it is also partly due to the nature of the product – small and light also means
Protecting virtual worlds of data in motion
Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT) devices to virtual repositories in the cloud and back again.
Does more surveillance offer more protection?
The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as counterterrorism
Lack of encryption is putting customer data at risk
Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption. If this proves true, then many more organizations may be putting customer data at risk.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.