422 posts
- Tips and Best Practices
- Threat Prevention
- Social Media
- Our Products
- News and latest trends
- IOT
- Digital Education
- Artificial Intelligence
Threat Prevention
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
Social Engineering techniques – What they are and How businesses can avoid them
Although it may be tempting to imagine hackers as being shy and socially inept types, whose only human interaction is via their computers, this…
10 careless errors that we keep making in IT security
You have read and reread numerous lists with tips on how to browse online safely, make online purchases, avoid your most intimate photos ending up…
Developers are neglecting the login security for both Android and iOS
You open an application to read the news, check your e-mail or social networks and, on many occasions, it asks you for a username (which…
Be careful when restoring your Android!
WhatsApp and Facebook logins may survive and end up in the wrong hands You are rarely separate from the device which is with you day…
Smart Lock: Enjoy your unlocked phone while you are in a ‘trusted’ place
We already know the importance of choosing well our passwords. In addition, if we want to do anything on our cellphone we have to follow…
CryptoLocker: What Is and How to Avoid it
CryptoLocker is a family of ransomware whose business model (yes, malware is a business to some!) is based on extorting money from users. This continues…