143 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
How much could a personal data breach cost your company?
A study carried out has shown that economic sanctions imposed by data protection bodies are far from being the only costs stemming from a data breach
The hunter becomes the hunted: How cyber counterintelligence works
Counterintelligence takes as a jumping off point one basic premise: if someone is going to attack your company, the best defense is a good offense.
What happens when I decline an app’s permission request?
When you install a new app, it often asks for permission to access other resources – what happens if you say no?
What happens if I violate GDPR?
Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared?
The Dangers of Plug-ins
Plug-ins are add-ons developed for all types of solutions and applications. All of them can cause significant security breaches at your company.
BYOD: when protecting the perimeter is not enough
BYOD has several advantages for companies. That said, it also presents various challenges for security. What risks does BYOD entail?
WannaMine – new cryptocurrency malware exposes failings of traditional anti-virus tools
WannaMine uses several exploits to compromise your computer – and many anti-virus tools cannot protect you against it. Here’s what you need to know.