Blog
Cybersecurity in the enterprise:
everything you need to know
The merger of these two leading Made In Italy companies has created a new reality, with the aim of consolidating its position as a top player in the cyber services…
As the digital landscape becomes increasingly complex and interconnected, the demand for individuals who specialise in fortifying the digital world against evolving cyber threats has skyrocketed. This is where the…
Robbers with guns and masks carrying cash out of an office window are heroes of old movies. Modern criminals conduct remote cyber-attacks to steal money. It can take them just…
There is something in common between cyber-attacks targeting companies. Most of them are phishing attacks, starting silently with a carefully crafted spear phishing email. Though the messages look quite ordinary,…
“Congratulations! You have just won 30 million euros – follow the link to grab it!”, said the message I received last week. Honestly, it was too much to be true,…
Talking about VPN or Virtual Private Network, without using technical terms and providing useful information even to non-professionals, is not an easy thing. Often these definitions are used to describe…
Many professionals work outside the office when they go on business trips and meet customers. Sometimes they need to connect to the internet to send an urgent email or check…
“Rooting” and “jailbreaking” – you have certainly heard these two words present on blogs dedicated to Android and iPhone. In this article we will find out what they mean. We…
Smartphones keep much sensitive personal and work-related information. Therefore, it is important to defend it and prevent from getting into the wrong hands. To avoid strangers unlocking your mobile phone,…
Working in public places, such as airports, restaurants and bars, large offices, and spaces dedicated to smart working presents a series of security risks. It requires some measure adoption to…
Sign up for newsletter