The Secret to an Effective VPN

Secure, remote access to mission-critical applications and data is one of the most sought-after capabilities organizations in every sector need. Recently, within the oil and gas sector, for example, massive reserves of liquid natural gas were found off the coast of Tanzania. The ability for third-party vendors to securely and remotely access operational data is […]

Read More…

The Top 3 Corporate IT Security Mistakes

The IT security group within every corporation is under file. Relentless cyber-attacks, user errors and improperly designed and implemented processes and procedures contribute to a maelstrom of problems that executives expect to be instantly solved. The news for IT departments continues to sound dire. Companies like Symantec estimate that 56% of employees believe it is […]

Read More…

Sage data breach highlights need for least privilege access and two common errors businesses make, warns Hypersocket Software

The data breach at UK accounting software company Sage has brought the insider threat facing businesses into focus and, according to security experts Hypersocket Software, highlights the need for more stringent access control. The Sage breach, which may have compromised the personal information of employees at 280 businesses, is thought to have resulted from unauthorised […]

Read More…

Access all Areas?

Driven by a growing number of security breaches, the demand for greater mobility at work and the trend towards Bring Your Own Device (BYOD) in the workplace, Identity and Access Management (IAM) is a growing area of focus for businesses across many sectors. Just how intense that focus is set to become is illustrated in […]

Read More…

The BYOD explosion: How much of a threat do personal devices really pose to your network?

How much of a risk is BYOD to network security? No more than company-issued hardware – provided businesses follow these four essential steps says Lee Painter. We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as […]

Read More…