News

Don’t want to be a victim of social engineering – learn 3 ways to defend yourself

People  like computers can be hacked and there is a chance that an attack can start with an attempt to manip...
Read more

Cybersecurity Analytics. And more specifically…?

The IT world is full of principles and good practices for maintaining cybersecurity. NIST Cybersecurity ...
Read more

IoT devices why they are prone to vulnerabilities and how to protect them

Devices connected in Internet of Things - IoT - are entering every aspect of our lives. In our homes, office...
Read more

50% OF DATA BREACH EVENTS RELATED TO THREATS INSIDE THE ORGANIZATION

Nowadays, the current workplace is global. In addition, it is transient and always connected to the network....
Read more

What is ISO 27001 and why it is so important to an organization

The vast majority of organizations - commercial and public, have some form of control over classified inform...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info