How to stay friends with remote workers & still rule IT security

Category: IT Security / Date: 22 August 2019

“Put that down”. “Careful with that, it’s fragile.” “What did I tell you about talking to strangers on your company smartphone?” IT managers sound suspiciously like mothers. And whether you have kids…

Read the article

Remote workers- drop your VPN or we’ll shoot!

Category: network access control, VPN / Date: 11 July 2019

Now that so many employees work from home or another location that isn’t the office, the call for safe remote connections increases. Often, companies choose the well-known VPN to fulfil this need.…

Read the article

“Don’t look at me” - Who’s responsible for IT security?

Category: IT Security / Date: 4 July 2019

To date, the question from the title remains unanswered. Because who is responsible for IT security in this modern age? Network users make a lot of unintentional mistakes, as they’re often unaware of…

Read the article

The short but solid guide to protecting your company Wi-Fi

Category: network access control / Date: 29 May 2019

In our last two blogs, we talked about WPA2 Personal, WPA2 Enterprise and additional measures you can take to secure your company Wi-Fi. The story made sense and the circle seems complete. But then…

Read the article

Scary Wi-Fi: the power of WPA2-Enterprise (if you do it right)

Category: network access control / Date: 16 May 2019

In our previous blog, we discussed the disadvantages of securing a company network with WPA2-Personal. We also promised that we’d come up with an alternative that’s much more suited for company…

Read the article

Scary Wi-Fi: the danger of WPA2-Personal (because no: it’s not safe)

Category: IT Security, network access control / Date: 2 May 2019

Quite some SMEs manage their Wi-Fi as if they’re at home. The connection is unprotected, easy-to-guess passwords are written down on post-its and are shared with everyone asking for access. But while…

Read the article

Head in the Cloud, feet on the ground: the future of NAC

Category: IT Security, network access control / Date: 18 April 2019

If we are to believe practically everyone around us, we’re doomed to fail unless we take all of our belongings to the Cloud. There, we can store and analyse data, exchange it with others and build…

Read the article

A no-nonsense guide to inline and port-based NAC differences

Category: network access control / Date: 4 April 2019

On any given day, there are a lot of knocks on your IT network door. So far in other blogs, we’ve talked about the pressures IT managers face to secure their network in times of BYOD policies, IoT…

Read the article

Safe or sorry? The place of access control in your security solution

Category: network access control / Date: 21 March 2019

The status quo in IT security is focused on detection. Virus scanners and network analysers control traffic on the network or chase down the bad guys. That worked well in the past, when people,…

Read the article

Back to the Future: why revisit Network Access Control?

Category: IT Security, network access control / Date: 6 March 2019

Imagine a little pesky piece of malware. There it is trying to get into your system. It can come in from anywhere; an employee bringing their own device, from the need to share Big Data, from…

Read the article