5 Tips for Securing Data and Devices While on Vacation

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Keeping Devices and Networks Secure

Click through for five best practices for companies and employees to keep devices and the networks they are attached to secure while on vacation, as identified by Steven Rogers, CEO at Centripetal Networks.

Vacations are a great time to get away from the office, but how many of us completely disconnect? Whether it’s a quick peek at email or an item you want to take care of, there’s an excellent chance you’ll be connecting while away.

While you may be taking time off, hackers are not. With the summer travel season approaching, Steven Rogers, CEO at Centripetal Networks, provides five best practices for companies and employees to keep devices and the network they are attached to secure while out on vacation. 

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.