5 Tips for Securing Data and Devices While on Vacation

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous 5 Tips for Securing Data and Devices While on Vacation-1 Next

Keeping Devices and Networks Secure

Click through for five best practices for companies and employees to keep devices and the networks they are attached to secure while on vacation, as identified by Steven Rogers, CEO at Centripetal Networks.

Vacations are a great time to get away from the office, but how many of us completely disconnect? Whether it’s a quick peek at email or an item you want to take care of, there’s an excellent chance you’ll be connecting while away.

While you may be taking time off, hackers are not. With the summer travel season approaching, Steven Rogers, CEO at Centripetal Networks, provides five best practices for companies and employees to keep devices and the network they are attached to secure while out on vacation. 

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.