Posts by author
Panda Security
Employee habits that can put your company at risk
There are many cybersecurity risks that companies can be exposed to. And the fact remains that there are several things that employees may do every day that could well lead to serious security breaches
Everything you need to know about cryptojacking
Cryptomining is a tactic that is becoming more and more popular among cybercriminals. Find out more about the emerging trend of cryptojacking, and what its consequences are.
52% of users reuse their passwords
Researchers have carried out a study on password reuse and modification patterns. They have uncovered an alarming figure: 52% of the users studied have the same passwords for different services.
Two-Factor Authentication Isn’t Foolproof
Two-factor authentication is a great breakthrough for security, but by no means does it mean that our job here is done and we can now put our feet up.
How to use a USB without the risk of data leaks
IBM has banned its staff from using all removable storage devices, such as USB sticks. However, you don’t need to go as far as this in order to keep your company’s data safe.
Cyber Resilience: What It Is and Why It’s Important
A cyber-resilient company is one that can prevent, detect, contain, and recover from a cyberattack, minimizing exposure time and the impact of countless serious threats against data, applications and IT infrastructure. This is how the latest Panda Security report defines it
Panda Data Control, the security module adapted to GDPR
-Panda Security presents Panda Data Control, the data security module adapted to the new General Data Protection Regulation which has been in force since May…