Meet the team at ICT for Education 2016!

Hypersocket Software is pleased to announce that the team of security experts will be exhibiting at ICT for Education on 18th November 2016 at Cranmore Park, Birmingham. Why should you stop by our stand? We’ll be showcasing our new suite of solutions at the show, our unique Single Sign-On virtual appliance for seamless access to cloud and on-premise […]

Read More…

Sage data breach highlights need for least privilege access and two common errors businesses make, warns Hypersocket Software

The data breach at UK accounting software company Sage has brought the insider threat facing businesses into focus and, according to security experts Hypersocket Software, highlights the need for more stringent access control. The Sage breach, which may have compromised the personal information of employees at 280 businesses, is thought to have resulted from unauthorised […]

Read More…

Identity and Remote Access with Hypersocket Password Manager

Managing the identity and access privileges of users on your network and IT systems is essential to cybersecurity. Hypersocket Software corporates a suite of ID and access management tools that provide a common user experience and enable organizations to enforce least privilege policies for remote users. It can automate tasks and make resources available in […]

Read More…

The United States’ Network Neutrality Ruling Puts a Focus on Data Management and Security.

A recent order for Internet broadband service providers adopted in February by the U.S. Federal Communications Commission may have large scale implications not only from a data management position, but also from a network security standpoint. At the very least, ruling may offset potential overhead cost escalations that the alternative may have caused for many […]

Read More…

Access Manager 1.1: End of Life

In June 2014, Nervepoint Technologies released Access Manager 1.2; it provides a new user interface, support for multiple types of user databases, as well as a range of exciting new features. It can be seen that the Version 1.2 is now a unique product in comparison to Version 1.1. What is more, 1.2 features and […]

Read More…

What are the lessons learnt from password hacking?

Hot off the heals, with the recent hacks on eBay and Gmail, it’s not surprising that we find 2 more respected organisations who’s security has been compromised and leaves data vulnerable to hackers. iThemes iThemes, a favoured website that provides themes and plugins for popular blog site WordPress, have contacted all their users with a notice […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

Has the 5 million Gmail password hack affected you?

On Wednesday, many technology websites and blogs broke the news that hackers leaked around 5 million stolen Gmail account details to a Russian Bitcoin forum. This follows similar leaks of account data from popular Russian web services, so is there room to be concerned? Understandably, this has caused huge outrage and worry amongst users of […]

Read More…

New Release Nervepoint Access Manager 1.1 R15

We are pleased to announce the release of Access Manager 1.1 R15 this week, R15 provides new options that allow for email notifications and outgoing emails from Access Manager to be sent to specified email addresses for administration, and additional options to manage the rate at which emails are sent from the Access Manger. In […]

Read More…