This is how you make remote access work [5 focus points]

Category: IT Security / Date: 17 October 2019

So your employees want to work from home. Great! Remote workers have the potential to deliver great work in less time, without occupying all of your company computers and eating all the granola bars…

Read the article

5 Scenarios You Don't Need to Worry About when using MailZen with Office 365

Category: IT Security / Date: 26 September 2019

Imagine one of your colleagues wants to access Office 365 when they’re out and about, using their own mobile? It’s not that hard to picture, right? But as an IT manager, you know this seemingly…

Read the article

How to stay friends with remote workers & still rule IT security

Category: IT Security / Date: 22 August 2019

“Put that down”. “Careful with that, it’s fragile.” “What did I tell you about talking to strangers on your company smartphone?” IT managers sound suspiciously like mothers. And whether you have kids…

Read the article

Remote workers- drop your VPN or we’ll shoot!

Category: network access control, VPN / Date: 11 July 2019

Now that so many employees work from home or another location that isn’t the office, the call for safe remote connections increases. Often, companies choose the well-known VPN to fulfil this need.…

Read the article

“Don’t look at me” - Who’s responsible for IT security?

Category: IT Security / Date: 4 July 2019

To date, the question from the title remains unanswered. Because who is responsible for IT security in this modern age? Network users make a lot of unintentional mistakes, as they’re often unaware of…

Read the article

The short but solid guide to protecting your company Wi-Fi

Category: network access control / Date: 29 May 2019

In our last two blogs, we talked about WPA2 Personal, WPA2 Enterprise and additional measures you can take to secure your company Wi-Fi. The story made sense and the circle seems complete. But then…

Read the article

Scary Wi-Fi: the power of WPA2-Enterprise (if you do it right)

Category: network access control / Date: 16 May 2019

In our previous blog, we discussed the disadvantages of securing a company network with WPA2-Personal. We also promised that we’d come up with an alternative that’s much more suited for company…

Read the article

Scary Wi-Fi: the danger of WPA2-Personal (because no: it’s not safe)

Category: IT Security, network access control / Date: 2 May 2019

Quite some SMEs manage their Wi-Fi as if they’re at home. The connection is unprotected, easy-to-guess passwords are written down on post-its and are shared with everyone asking for access. But while…

Read the article

Head in the Cloud, feet on the ground: the future of NAC

Category: IT Security, network access control / Date: 18 April 2019

If we are to believe practically everyone around us, we’re doomed to fail unless we take all of our belongings to the Cloud. There, we can store and analyse data, exchange it with others and build…

Read the article

A no-nonsense guide to inline and port-based NAC differences

Category: network access control / Date: 4 April 2019

On any given day, there are a lot of knocks on your IT network door. So far in other blogs, we’ve talked about the pressures IT managers face to secure their network in times of BYOD policies, IoT…

Read the article
Page 1 of 2
1 2