Tech Support

Trustwave Report: Malware Continues to Exploit Unsecured Vendor Access

Unsecured remote access accounted for 29.7% of network compromises in 2016, more than double than the year prior, according to findings from the Trustwave Global Security Report. Read On

Recovering from the PetyaWrap Ransomware Attack & Preparing for Whatever’s Next

Businesses that fail to secure their networks from known exploits will continue to be targeted by malware attacks. Yesterday, those who didn’t learn this lesson during the recent WannaCry fiasco got.... Read On

[INFOGRAPHIC] NETWORK SECURITY: PREPARE FOR HUMAN ERROR

Are user credentials sufficient for secure authentication?  Read On

RAT infestation? The threat of Remote Access Trojans on Android devices

The return of the SpyNote RAT as a fake Netflix app in late January gave notice that Remote Access Trojans may be the next large scale cyber threat.  Originally surfaced in the summer of 2016,.... Read On

EU Data Protection reform and its implications on remote access

In December 2015 the EU Commission put forward a reform of Data protection regulation that aims to “to make Europe fit for the digital age." The regulation will take effect on May 25, 2018. Read On

Webinar: Understanding Security Threats and Mitigating Risk

What are the most effective ways to mitigate risk from the rising tide of security threats facing retailers, banks, hospitals and other organizations? In a new webinar, Sam Heiney of Netop shares.... Read On

Remote Access & the Internet of Things at Embedded World 2015

It seems I hear about a new security breach every day. Hackers stealing credit cards, breaking into building automation systems, compromising data centers, phone records - the list is endless. I also.... Read On

H1 2014 Security Breaches

With the first half of the year coming to an end, it's important to reflect on some of the security breaches that have been reported so far in 2014. Fortunately, none were on the scale of last year’s.... Read On

Survey says: How IT pros use VPNs

We just published a new research report on how virtual private networks (VPNs) are being deployed, managed and secured by network professionals.  Conducted in cooperation with Spiceworks, the “2014.... Read On

Another Day, Another Lawsuit

As the fall-out of last year’s security breach at Target continues, there are now more than 90 lawsuits that have been filed against the retailer and its partners. Most recently, Chicago-based credit.... Read On

Subscribe to Email Updates

OUR LOCATIONS

Birkerød, DK
Portland, OR, US
Chicago, IL, US
Bucharest, RO

Americas: +1 866 725 7833
Worldwide: +45 4590 25 25

Our Tweets