Cyber-attacks made it into the Global Risks TOP 10
Almost every day, we hear news about cybercriminals leaking confidential information, cyber-attacks to the media, massive cases of phishing or WhatsApp scams. That’s why for…
How does Fusion protect Government bodies? – Case Study
We have many times talked about Fusion as a solution which protects, manages and offers remote support to all the IT infrastructure in your organization.…
This is how Facebook, Twitter or LinkedIn fight to protect your security
Probably when you were reading about the privacy policy on Facebook or Twitter, you skipped the part of ‘how to protect yourself from cyber attackers’.…
InboxScan: the service that checks if you have saved your passwords in your email
Passwords are the unfinished business of Internet users. We have all had the same problem. After carefully picking the perfect password with capital letters, numbers,…
When Minecraft Meets IT Security
The phenomenon that is Minecraft began life back in 2009 as a sandbox construction game and has grown into one of the most popular…
Panda Antivirus 2015 latest update: all about our three great innovations
If you are reading this after being informed by your computer that your product has been automatically updated, probably by now you have realized we…
Mass emails without BCC and other unsafe (and illegal) habits
Either by mistake or ignorance, your company may be facing a hefty fine. You may ask yourself why? The answer, the daily emails your employees…