Skip to content

Blog

Cybersecurity in the enterprise:
everything you need to know

Blog post
  • TAGS

Smartphones keep much sensitive personal and work-related information. Therefore, it is important to defend it and prevent from getting into the wrong hands. To avoid strangers unlocking your mobile phone,…

Working in public places, such as airports, restaurants and bars, large offices, and spaces dedicated to smart working presents a series of security risks. It requires some measure adoption to…

According to multiple estimations Carbanak has generated around 1 billion dollars by hitting banks worldwide. It was mainly attacking companies in Europe, the United States, and China between 2013 and…

tailgating and piggybacking

Tailgating and Piggybacking are two social engineering practices. They exploit the human factor to violate areas reserved for authorized personnel. It brings consequent risk for security of both physical and…

gdpr easy guide for beginners

The 2016/679 European regulation (most known as GDPR) came into force in the end of May 2018. In this easy guide we will try to explain the key points of…

Sign up for newsletter

Error: Contact form not found.

Back To Top