143 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
Protect yourself against technical support scams
For some time now, a variant of scam is being used by attackers to try to break into your computer. The fraudsters usually call you…
Disk encryption, a security layer that is easy to break
Sometimes our security barriers are insufficient against attacks. Don t let your guard down! Discover how to act during these disk encryption incidents.
If you find a USB stick, resist the temptation to open it
Cyber-criminals are infecting our computers with malicious programs by using storage devices.
Be careful with CryptoBit, the latest threat detected
2016 has been loaded with developments in the world of cyber-security. The latest news? CryptoBit, a type of ransomware known for its unique characteristics. Discover how to deal with it!
‘Locky’. How it works
We don’t know if you’ve heard of the new Ransomware which is called ‘Locky’… It works as follows: It arrives by mail and the attachment is…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
10 careless errors that we keep making in IT security
You have read and reread numerous lists with tips on how to browse online safely, make online purchases, avoid your most intimate photos ending up…