Six Steps to Avoid Becoming A Data Breach Statistic

US fast-food chain Wendy’s is the latest organisation to suffer a significant data breach. As the story unfolds, it’s clear the business seems to have been caught off guard in fully understanding the impact and extent of the breach. This isn’t at all unusual – the first time many businesses know they’ve been hacked is […]

Read More…

Hypersocket Software Introduces Enterprise Level Single Sign-On Technology at SME Prices

SSO and password hacks help businesses boost productivity and increase cybersecurity Nottingham, 02 June 2016 – With news that a seven character password now takes a hacker under a second to crack, the need for employees to use stronger, more complex passwords as an essential weapon in any organisation’s cybersecurity arsenal has never been more […]

Read More…

Meet the team at Infosecurity Europe 2016!

Hypersocket Software is pleased to announce that the team of security experts will be exhibiting at Infosecurity Europe 2016 from 7th – 9th June at stand K68. Why should you stop by our stand? We’ll be showcasing our new suite of solutions at the show, our unique hybrid VPN for secure remote access to mission-critical […]

Read More…

Password Manager in Healthcare: The Implications of the Internet of Things (IoT) in the Healthcare Industry

The positive effects of IoT in the healthcare industry are undeniable, and by some accounts, staggering. The development of life-changing technology for homes, hospices, healthcare clinics, and hospitals is rampant. IoT in healthcare is a fire that grows uncontrollably, inspiring companies like Philips, best known for personal hygiene, to create an entire healthcare subsidiary dedicated […]

Read More…

Getting to User Adoption: Top 2 Steps that Jump the Gap in password managers

Poor user adoption is a nightmare shared by most IT project managers. The idea of spending countless dollars and hours of labor only to go live with a new service or tool that lacks total end-user adoption is enough to keep anyone awake at night. Such a fear is prevalent even with the implementation of […]

Read More…

The trouble with reverse proxying

One of the big use cases for having an SSL VPN is the ability to grant secure access to internal company websites to your remote users. This is generally done by reverse proxying and when it works right it’s a great way of securing your internal sites that you would rather not have directly facing […]

Read More…

Is Outsourcing IT A Good Idea?

Security is an important part of any business and ensuring that the business is fully protected can be a very time consuming job, this is especially the case when organizations are not willing to expand and trust external security providers, thus most of their IT work is allocated to the in-house IT department. These tasks […]

Read More…

The Requirements Quagmire: Sidestep a Common Single Sign-On Implementation Issue

A good foundation is just as crucial in implementing a technology, like Single Sign-On, as it is in building a sturdy structure. In implementing a technology initiative, that foundation starts with acquiring and documenting the business and technology requirements in a clear manner. All too often the lack of properly documented requirements right from the […]

Read More…

Success to Having Maximum Security When it Comes to Mobility

Mobility can be challenging if it is not managed correctly. Incorporating mobility into the business strategy can effectively extend and establish the organisations potential as well as employee productivity. However, this can place excessive demands and pressure on the IT administrators, management and security team. The reason for the increased burden and pressure on the […]

Read More…

New trends – Password Manager and BYOD

A recent Gartner survey of CIOs estimates that by 2017, half of all employers will require employees to buy their own devices. When I read this statistic, the first two questions that entered by mind was: How will workers react if BYOD becomes mandatory? With strict policies on security, device choices and the growing variety […]

Read More…