Don’t want to be a victim of social engineering – learn 3 ways to defend yourself
People like computers can be hacked and there is a chance that an attack can start with an attempt to manip...
Read more
Cybersecurity Analytics. And more specifically…?
The IT world is full of principles and good practices for maintaining cybersecurity. NIST Cybersecurity ...
Read more
IoT devices why they are prone to vulnerabilities and how to protect them
Devices connected in Internet of Things - IoT - are entering every aspect of our lives. In our homes, office...
Read more
50% OF DATA BREACH EVENTS RELATED TO THREATS INSIDE THE ORGANIZATION
Nowadays, the current workplace is global. In addition, it is transient and always connected to the network....
Read more
What is ISO 27001 and why it is so important to an organization
The vast majority of organizations - commercial and public, have some form of control over classified inform...
Read more