12 tips on how to stop cybercriminals from ruining your next vacation
No matter what your plans are, stay safe when you are away from home! We share a list with 12 tips on how to stop cybercriminals from ruining your vacation.
What happens if I violate GDPR?
Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared?
The Dangers of Plug-ins
Plug-ins are add-ons developed for all types of solutions and applications. All of them can cause significant security breaches at your company.
Your Company’s IT Resources are a Mine for Hackers
Bitcoin has kicked off the cryptocurrency boom. But as society’s interest in cryptocurrencies has grown, so has criminal interest.
BYOD: when protecting the perimeter is not enough
BYOD has several advantages for companies. That said, it also presents various challenges for security. What risks does BYOD entail?
Satori and the Latest Botnets to Wreak Havoc on the IoT
In this post, we take a look at some of the most dangerous botnets, as well as some of the ways that they can be combatted to protect the IoT.
Cryptocurrency. A tool for criminals?
The rise of digital currencies is causing serious concerns in the world of cybersecurity. Are cryptocurrencies mainly a tool for criminals?