American Author Clifford Stoll has argued that the best quote whilst teaching others the importance of proper password safety is: “Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” This quote is perhaps the best way to teach your children proper password procedures, along […]
6 Exciting Updates From 2014
2014 was the year of security breaches with companies one after another who were becoming victims to hackers and data breaches. The climate for 2015 looks to be the aftermath with everyone wondering what can be done to prevent such things in the future. In 2014, Hypersocket took these incidents and focused upon ensuring […]
What is the Danger of BYO Device Policies?
How to Protect your Network from Personal Devices The “consumerisation’ of business technology is picking-up speed. This trend towards the introduction of consumer technology within the corporate environment for the use of work activities is best reflected in policies like Bring Your Own Device (BYOD). These policies have become prevalent in most corporate environments, and […]
The Virtues of Virtual Private Networks (VPNs)
The Virtues of Virtual Private Networks Cloud computing is here to stay, and the buzz throughout industry and government is that hybrid clouds will become the new norm going forward. Hybrid clouds, according to industry experts, can offer the security of on premise, private clouds and the flexibility and agility of commercial public clouds. The […]
Regulating IT: The Two Most Important IT Security Takeaways from Cyber Regulations
The biggest challenge facing most companies today is IT security. The seemingly endless increase in cyber-attacks and password breaches are only the tip of the iceberg. A tightening of all regulations and compliance requirements around IT Security, foreign conflicts that are now affecting the average consumer, and the increase in the number of networkable devices […]
