Identity and Data Protection


31 articles

Identity and Data Protection

The importance of cybersecurity in healthcare

The importance of cybersecurity in healthcare

Identity and Data Protection

The importance of cybersecurity in healthcare

Data breaches and identity theft can be just as dangerous to your clients as viruses or sepsis. How can you address this? Let’s explore.

Editor26 Mar 2025


Identity and Data Protection

Securing your digital life: What should your MFA solution feature?

Securing your digital life: What should your MFA solution feature?

Identity and Data Protection

Securing your digital life: What should your MFA solution feature?

Passwords aren't enough. As threats keep evolving, involving multiple layers of authentication is the key to having your accounts protected.

Editor28 Jan 2025


Identity and Data Protection

Beyond the basics: Advanced strategies for VPN protection

Beyond the basics: Advanced strategies for VPN protection

Identity and Data Protection

Beyond the basics: Advanced strategies for VPN protection

A VPN is your shield against cyberattacks, but it could also become your weakness.

Editor21 Jan 2025


Identity and Data Protection

Secure Authentication: Put your cybersecurity helmet on

Secure Authentication: Put your cybersecurity helmet on

Identity and Data Protection

Secure Authentication: Put your cybersecurity helmet on

Multi-factor authentication is a necessity, and now it’s easy to deploy.

Roman Cuprik30 Sep 2024


Identity and Data Protection

Annoying but necessary: How to decrease the burden of authentication requirements

Annoying but necessary: How to decrease the burden of authentication requirements

Identity and Data Protection

Annoying but necessary: How to decrease the burden of authentication requirements

Authentication mechanisms are a vital aspect of cybersecurity deserving adequate protection, but increasing complexity makes them an easier target.

Roman Cuprik02 Aug 2024


Identity and Data Protection

Keeping encryption secure from BitLocker sniffing

Keeping encryption secure from BitLocker sniffing

Identity and Data Protection

Keeping encryption secure from BitLocker sniffing

Encryption has often been the poster child of efficient and secure protection - but even it can fail unless some rather simple security measures are in place to safeguard it.

Márk Szabó27 Feb 2024


Identity and Data Protection

How to limit damage when a device is lost or stolen

How to limit damage when a device is lost or stolen

Identity and Data Protection

How to limit damage when a device is lost or stolen

No matter how vigilant people are, accidents happen, and devices can go missing. Are you prepared to limit the potential damage to your business, should a device fall into the wrong hands?

Editor04 Jan 2024


Identity and Data Protection

Virtual meeting room: Is your videoconferencing safe from unauthorized access?

Virtual meeting room: Is your videoconferencing safe from unauthorized access?

Identity and Data Protection

Virtual meeting room: Is your videoconferencing safe from unauthorized access?

Video conferencing has many benefits, but not unlike physical interaction, it can also harbor many dangers that can expose businesses to data risks.

Editor06 Dec 2023


Identity and Data Protection

Mitigating risk – data loss prevention helps prevent security disasters

Mitigating risk – data loss prevention helps prevent security disasters

Identity and Data Protection

Mitigating risk – data loss prevention helps prevent security disasters

Data loss prevention (DLP) should be a part of any company’s data protection repertoire.

Márk Szabó25 Aug 2023