Blog
Cybersecurity in the enterprise:
everything you need to know
“Congratulations! You have just won 30 million euros – follow the link to grab it!”, said the message I received last week. Honestly, it was too much to be true,…
Talking about VPN or Virtual Private Network, without using technical terms and providing useful information even to non-professionals, is not an easy thing. Often these definitions are used to describe…
Many professionals work outside the office when they go on business trips and meet customers. Sometimes they need to connect to the internet to send an urgent email or check…
“Rooting” and “jailbreaking” – you have certainly heard these two words present on blogs dedicated to Android and iPhone. In this article we will find out what they mean. We…
Smartphones keep much sensitive personal and work-related information. Therefore, it is important to defend it and prevent from getting into the wrong hands. To avoid strangers unlocking your mobile phone,…
Working in public places, such as airports, restaurants and bars, large offices, and spaces dedicated to smart working presents a series of security risks. It requires some measure adoption to…
According to multiple estimations Carbanak has generated around 1 billion dollars by hitting banks worldwide. It was mainly attacking companies in Europe, the United States, and China between 2013 and…
Tailgating and Piggybacking are two social engineering practices. They exploit the human factor to violate areas reserved for authorized personnel. It brings consequent risk for security of both physical and…
The 2016/679 European regulation (most known as GDPR) came into force in the end of May 2018. In this easy guide we will try to explain the key points of…
Sign up for newsletter