The modern-proof alternative to MAC address filtering

Category: IT Security / Date: 19 March 2020

When you’re an IT manager, you’ve probably heard of MAC address filtering. Today, many organisations still use it to manage IT access, by letting in all whitelisted MAC addresses while keeping out…

Read the article

The fall of Mobile Device Management and the rise of the app container

Category: IT Security / Date: 16 January 2020

When I talk to IT managers, we often discuss the grip they lack. Co-workers run around with privately owned laptops and phones, that differ in operating system, update pace and settings. IT managers…

Read the article

What is Remote Access Control? (No, it’s not a stupid question)

Category: IT Security / Date: 14 November 2019

Many people understand the concept of remote access. It’s working without being physically present at the office, right? Well yeah, sort of. But if you’re responsible for securing this remote access,…

Read the article

This is how you make remote access work [5 focus points]

Category: IT Security / Date: 17 October 2019

So your employees want to work from home. Great! Remote workers have the potential to deliver great work in less time, without occupying all of your company computers and eating all the granola bars…

Read the article

5 Scenarios You Don't Need to Worry About when using MailZen with Office 365

Category: IT Security / Date: 26 September 2019

Imagine one of your colleagues wants to access Office 365 when they’re out and about, using their own mobile? It’s not that hard to picture, right? But as an IT manager, you know this seemingly…

Read the article

How to stay friends with remote workers & still rule IT security

Category: IT Security / Date: 22 August 2019

“Put that down”. “Careful with that, it’s fragile.” “What did I tell you about talking to strangers on your company smartphone?” IT managers sound suspiciously like mothers. And whether you have kids…

Read the article

“Don’t look at me” - Who’s responsible for IT security?

Category: IT Security / Date: 4 July 2019

To date, the question from the title remains unanswered. Because who is responsible for IT security in this modern age? Network users make a lot of unintentional mistakes, as they’re often unaware of…

Read the article

Scary Wi-Fi: the danger of WPA2-Personal (because no: it’s not safe)

Category: IT Security, network access control / Date: 2 May 2019

Quite some SMEs manage their Wi-Fi as if they’re at home. The connection is unprotected, easy-to-guess passwords are written down on post-its and are shared with everyone asking for access. But while…

Read the article

Head in the Cloud, feet on the ground: the future of NAC

Category: IT Security, network access control / Date: 18 April 2019

If we are to believe practically everyone around us, we’re doomed to fail unless we take all of our belongings to the Cloud. There, we can store and analyse data, exchange it with others and build…

Read the article

Back to the Future: why revisit Network Access Control?

Category: IT Security, network access control / Date: 6 March 2019

Imagine a little pesky piece of malware. There it is trying to get into your system. It can come in from anywhere; an employee bringing their own device, from the need to share Big Data, from…

Read the article
Page 1 of 1