Impero Solutions

Impero Blog

The School’s Guide to Apps Students Are Using: Top 10 Most Popular & Dangerous

Technology plays a significant role in today’s classrooms. Unfortunately, anonymous messaging apps, random video chats, and other platforms that lock or hide other apps raise safety and security concerns for educators.  Despite efforts to educate students, they don’t always exercise good judgment. Some of the more commonly used apps among students exhibit safety concerns that …

The School’s Guide to Apps Students Are Using: Top 10 Most Popular & Dangerous Read More »

Read More

GDPR: TL;DR? The 5 Keys to Compliance You Need to Know

The GDPR, or the General Data Protection Regulation, governs the way businesses process, move, and store the personal data of EU citizens. Organizations within the EU are affected of course, but any other global organizations that process data of EU ...
Read More

Remote Access and GDPR Part 4: Data Minimization

Welcome back to Impero Connect's ongoing series on the 2018 General Data Protection Regulation, where we dive into the EU regulation and how it impacts the way we use remote access tools. Today our focus is on data minimization, at ...
Read More

Secure Remote Privileged Access for Your Vendors’ Technicians

Many organizations depend on a variety of external vendors to support their IT infrastructure, network and systems. In many cases, they overlook remote third-party access as a privileged access point that requires narrow security controls. “Most organizations granting remote privileged ...
Read More

Remote Access and GDPR Part 2: Pseudonymization and Encryption

The pseudonymization and encryption of personal data is required by the GDPR, but before we dive into this, ask yourself: how confident am I in my understanding of these terms? Even seasoned IT professionals struggle with these – especially when ...
Read More

Remote Access and GDPR: A Compliance Odyssey – Part 1

With the release of the updated General Data Protection Regulation, its impact on remote control software has been on my mind a lot recently. If the topic of remote control and data protection doesn’t ring your bell, I understand. Unless ...
Read More

WannaCry: Anatomy of a Ransomware Attack

As this is written, one of the largest cyberattacks in history is underway across the globe. 75,000 ransomware attacks in 99 countries are reported to be exploiting the Windows vulnerability "EternalBlue," which Microsoft had released a patch for earlier this year. The ...
Read More