146 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
Marketers develop a new sneaky tracking technique
Digital marketers are desperate to know everything they can about you – and they’re tracking your phone to do it.
SIM Hijacking Explained
What is SIM hijacking and how do they do it? SIM swapping is essentially the process of hackers activating your number onto a SIM card of their possession.
What Is Doxxing? How It Works + How to Protect Yourself
Doxxing is a type of cyberbullying that exposes your personal information, like your address or phone number. It’s malicious and can be extremely harmful to…
How much could a personal data breach cost your company?
A study carried out has shown that economic sanctions imposed by data protection bodies are far from being the only costs stemming from a data breach
The hunter becomes the hunted: How cyber counterintelligence works
Counterintelligence takes as a jumping off point one basic premise: if someone is going to attack your company, the best defense is a good offense.
What happens when I decline an app’s permission request?
When you install a new app, it often asks for permission to access other resources – what happens if you say no?
What happens if I violate GDPR?
Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared?