Alphabet Soup: Navigating SCADA, and Industrial Control Systems and VPNs increasing importance in all of these technologies.

All the terminology is daunting. Whether, Operational Technology (OT), Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) or Internet of Things (IoT), it’s important for the C-suite of executives to understand the differences and find a way to maintain the accessibility of these technologies while complying with local regulations. One greatest common denominator […]

Read More…

Sage data breach highlights need for least privilege access and two common errors businesses make, warns Hypersocket Software

The data breach at UK accounting software company Sage has brought the insider threat facing businesses into focus and, according to security experts Hypersocket Software, highlights the need for more stringent access control. The Sage breach, which may have compromised the personal information of employees at 280 businesses, is thought to have resulted from unauthorised […]

Read More…

Create a Solid Network Infrastructure with Managed File Transfer

In today’s global business environment when employees dispersed around the world need to be able to exchange data across their networks securely and effectively, a solid IT infrastructure is an organisation’s safety net. For many enterprises, File Transfer Servers (FTS) are the back-bone of their network. Essentially a computer within the client/server model responsible for […]

Read More…

Access all Areas?

Driven by a growing number of security breaches, the demand for greater mobility at work and the trend towards Bring Your Own Device (BYOD) in the workplace, Identity and Access Management (IAM) is a growing area of focus for businesses across many sectors. Just how intense that focus is set to become is illustrated in […]

Read More…

The BYOD explosion: How much of a threat do personal devices really pose to your network?

How much of a risk is BYOD to network security? No more than company-issued hardware – provided businesses follow these four essential steps says Lee Painter. We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as […]

Read More…

Integration Point: Password Manager and Digital Transformation

Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly […]

Read More…

Hypersocket Software Introduces Enterprise Level Single Sign-On Technology at SME Prices

SSO and password hacks help businesses boost productivity and increase cybersecurity Nottingham, 02 June 2016 – With news that a seven character password now takes a hacker under a second to crack, the need for employees to use stronger, more complex passwords as an essential weapon in any organisation’s cybersecurity arsenal has never been more […]

Read More…

Meet the team at Infosecurity Europe 2016!

Hypersocket Software is pleased to announce that the team of security experts will be exhibiting at Infosecurity Europe 2016 from 7th – 9th June at stand K68. Why should you stop by our stand? We’ll be showcasing our new suite of solutions at the show, our unique hybrid VPN for secure remote access to mission-critical […]

Read More…

Password Manager in Healthcare: The Implications of the Internet of Things (IoT) in the Healthcare Industry

The positive effects of IoT in the healthcare industry are undeniable, and by some accounts, staggering. The development of life-changing technology for homes, hospices, healthcare clinics, and hospitals is rampant. IoT in healthcare is a fire that grows uncontrollably, inspiring companies like Philips, best known for personal hygiene, to create an entire healthcare subsidiary dedicated […]

Read More…

Getting to User Adoption: Top 2 Steps that Jump the Gap in password managers

Poor user adoption is a nightmare shared by most IT project managers. The idea of spending countless dollars and hours of labor only to go live with a new service or tool that lacks total end-user adoption is enough to keep anyone awake at night. Such a fear is prevalent even with the implementation of […]

Read More…