Computer says no: Password problems leave UK workers wasting more than two days a year logging in

17% spend more than five minutes logging on each day A quarter must log in to five different apps and systems Nearly one in five write down passwords to remember them Nottingham, UK, 24th January 2017 – Poor password practices leave UK workers potentially wasting more than two days each year using multiple credentials to […]

Read More…

How VPNs can Help IoT Companies Avoid Future Attacks

The world has been rudely awakened to the dangers posed by unsecured Internet of Things (IoT) devices deployed in the billions. A botnet comprised largely of IoT devices, dubbed Mirai by its creators, unexpectedly struck on October 21st with a massive denial of service attack that took down some of the biggest Internet sites in […]

Read More…

The rise of the global economy and password security

The rise of global economy and the emergence of commercial off-the-shelf (COTS) technology have produced great efficiencies and innovation. Nowhere is this more evident than in information and communications technology, which has undergone a revolution in the past two decades. The current global ecosystem provides lower costs, interoperability, and flexibility to manufacturers and their customers, […]

Read More…

Meet the team at ICT for Education 2016!

Hypersocket Software is pleased to announce that the team of security experts will be exhibiting at ICT for Education on 18th November 2016 at Cranmore Park, Birmingham. Why should you stop by our stand? We’ll be showcasing our new suite of solutions at the show, our unique Single Sign-On virtual appliance for seamless access to cloud and on-premise […]

Read More…

The Secret to an Effective VPN

Secure, remote access to mission-critical applications and data is one of the most sought-after capabilities organizations in every sector need. Recently, within the oil and gas sector, for example, massive reserves of liquid natural gas were found off the coast of Tanzania. The ability for third-party vendors to securely and remotely access operational data is […]

Read More…