Hardly a week goes by without the obligatory media coverage of the latest dangers of the digital world. But there is good reason for the constant stream of news headlines. It is also clear that phishing emails, Trojans, ransomware and others are no longer a danger just for private individuals.
Posts in category Network Security
Not so long ago, the work of system and network administrators was clearly defined, and the interaction of the network components was easier to understand. However, recent years have seen an explosion in the demands on enterprise networks.
Be it at work or in your own home: Fast and secure Wi-Fi is pretty much taken for granted these days. When it comes to security, the reality may look very different. Or are you able to keep track of exactly who is in your company network at all times?
If you have been around since the earliest days of the digital revolution, you won’t know it any other way: Electronic devices age fast, they go wrong, they die sudden deaths, they get hacked, or all at once they are incompatible with the state of the art. A couple of years go by, and what […]
In our ever faster moving world of interconnectivity of everything and the all-encompassing digitalization and automation of workflows and business processes, we expect IT networks to follow suit. However, traditional networks are increasingly struggling to meet these expectations. Their complexity demands a considerable level of expert knowledge and effort to integrate new devices or locations, […]
When you visit a company or public building these days, on arrival you often receive the Wi‑Fi login data for the free guest access. In most cases, hotspots that offer guest access are securely separated from the company network and prevent any access to internal data. So when it comes to wireless network security, we […]
Last week saw the third anniversary of the day when a young man named Edward Snowden revealed the extent of and details about the mass-surveillance conducted by his employer, the National Security Agency. The secret documents he disclosed to the world proved that the US intelligence services had been undermining our rights of privacy and […]
Cloud applications have become a part of our everyday lives at home, on the move, and at the office: Streaming videos, exchanging photos and documents, e-mail, and much more are “in the cloud” these days. For companies in particular, the potential of cloud computing is huge. Current statistics show how great this is: For example, […]
The ongoing political debate about government built-in or specially created backdoors in IT products is hitting the nerve of millions of people. This is about far more than “merely” decrypting a single mobile phone of a suspected criminal. It threatens our fundamental right to personal data privacy and security.
Early this year, New York City announced that it was replacing its public phone booths with fast and free public Wi-Fi hotspots. The sheer scale of this network is not the only thing of interest, though. These hotspots differ from most of those we may be familiar with. They use a technology called Hotspot 2.0, […]