5 Tips for protecting corporate data

5 Tips for protecting corporate data

A data breach can happen to anyone, even to the most secure businesses or financial institutions — and cybercriminals could even attack your company’s network. How can you be sure your network is completely hacker-safe? As a business owner, you can’t afford a data breach, as it could cost you your clients and reputation.

Why you should care about HTTPS

Why you should care about HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts with “https” and whether there is a symbol of a closed padlock beside it.

Benefits of using a VPN

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? […]

Security challenges in healthcare IoT

Security challenges in healthcare IoT

The Internet of Things (IoT) has the potential to revolutionize the healthcare industry. But as with any new technology, it also brings a slew of security risks healthcare professionals need to address. Devices that contain a treasure trove of patient data are attractive targets for cybercriminals.

5 Simple but effective cybersecurity tricks

5 Simple but effective cybersecurity tricks

Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately, cyberattacks are far too common to be lax about staying safe online. Your identity could be stolen, or even worse, you could expose private information belonging to your company’s clients.

HTTPS is something to care about

HTTPS is something to care about

For all the time we spend discussing the complexity of internet security, there are a few simple things you can do. Avoiding websites that aren’t secured with the HTTPS protocol is one of them. It’s a habit that can be developed with a better understanding of what the padlock icon in your web browser’s address […]

The Impact on Network Security Through Encrypted Protocols – QUIC

The Impact on Network Security Through Encrypted Protocols – QUIC

I have already written about two secure protocols that are impacting our network security.

The first was HTTP/2, the second one was TLS 1.3. Both posts can be found here:

HTTP/2
TLS1.3

Today I want to talk about another very important protocol, it is called QUIC.

QUIC stands for QUICK UDP INTERNET CONNECTIONS. It is an experimental protocol designed and deployed by Google.

Prevent an Encryption Bottleneck on High-Speed Links

Prevent an Encryption Bottleneck on High-Speed Links

What if you had a car with a powerful, turbo-charged engine that could fly along at 130 mph —until you turned on the air conditioner and watched the max speed drop to 50? Pick up two friends, and it struggles to maintain 30 mph.

This would be depressing for you as a driver, but it does make a good analogy for IT managers trying to leverage Internet Protocol Security (IPSec) for high speed link encryption requirements.