Posts tagged with "VPN"



Quantum Computing | Time to Get Post-Quantum Ready
21. March 2023
As we discussed in a recent blog post, quantum computing, like any major technological advance, will bring a lot of good things, but it also poses a serious risk to the security of our communications, making them vulnerable to new quantum-powered attacks performed by state-sponsored cybercriminals. While most technologies used to secure our data were believed to be secure and “unbreakable” some years ago, they will certainly not be in the years to come. Quantum computing is accelerating...

Quantum Computing | Time to Get Post-Quantum Ready
Blog | Expert's view · 07. February 2023
Quantum computing has been on the rise in recent years, going from a conceptual, futuristic technology to becoming a reality. The first quantum-based products are now becoming available to consumers, from computers to smartphones. While this new branch of computing could be a major milestone in the evolution of computers and allow for processing more information faster than before with many applications, it could also possibly endanger the security of our data and communications, as the current...

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

State Sponsored Cyberwarfare at Your Doorstep: What Can You Do?
Blog | Expert's view · 09. March 2022
Theater of war is not limited to the grounds of faraway lands; your critical infrastructure is a tempting target for those looking to cause disruption or destruction as a part of their warfare. The recent armed conflict has highlighted what is possible and the potential for those state sponsored actors. In the US, the Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations on how organizations can protect themselves. No organization, no matter the size or area of...

Cyber Security Solutions
Blog | Endpoint Protection · 01. March 2022
Protecting your organization against cybersecurity threats is not as simple as installing the most expensive security products available on the market, but rather understanding your own business and security needs how those needs impact your infrastructure, all the components involved, how they are prone to cyberattacks, and how you can protect them.

The Year in Review, and Looking Forward to 2022
Blog | Expert's view · 16. November 2021
After an unconventional year like 2020, with an unexpected pandemic putting the whole world on a hold, 2021 was largely expected to be back to “business as usual” with employees returning to the office as vaccines became available and the threat of COVID dwindled.

New iOS 15 Enterprise Features: Everything You Need to Know
Blog | Expert's view · 28. September 2021
At their latest Worldwide Developer Conference (WWDC) this past summer, Apple announced several new features in their soon-to-be-released iOS 15, noting an emphasis on communication changes and on-device intelligence. For this article we will focus on the new enterprise features, allowing easier and more advanced management of end-user devices while simultaneously improving the end-user experience and privacy. 

VPN Remote Work
25. February 2021
Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.

Looking forward to 2021
12. January 2021
While we can certainly agree that 2020 was unconventional to say the least, we can now look back and appreciate some of the positives that arose. In response to COVID-19 and the resulting precautionary protocol, everyone – businesses and individuals alike – had to change how they go about their daily lives. Many companies have been obligated to keep their employees at home if deemed “non-essential,” but the challenge remains of having operations and customers to attend to.

Show more