CATEGORIES

News

Single Sign On in Compliance With Security Best Practices

The sheer number of tasks we do online grows every year as we create and discover new  opportunities to digitize our world. This is true within the workplace as well, but as we find more processes to automate using cloud-based technology and new apps to improve...

Main elements to include in a company cybersecurity strategy

There is no “one size fits all” when it comes to cybersecurity. Over the last six months, we have seen an escalation in the number of reported cyberattacks, in their range, sophistication and in their long-lasting impact on businesses such as the Colonial Pipeline...

30 November: International Information Security Day

On November 30, the International Information Security Day. A celebration that arose in 1988, as a consequence of the first case of malware spreading over the network that was registered in the world, known under the name of “Morris worms”, which affected 10% of the...

Holidays Fuel Surge Online Phishing Scams

We’ve all been targeted in phishing attacks — fake messages from a seemingly trusted or reputable source designed to convince you to click on a malicious link, reveal information, give unauthorized access to a system or execute a financial transaction. It may come as...
Effective Cyber Resilience

Effective Cyber Resilience

Cyber resilience refers to the ability to protect electronic data and systems from cyberattacks. As well as to quickly resume business operations in the event of a successful attack. According to...

read more
Digital Signatures

Digital Signatures

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. Everywhere you can see the importance of digital...

read more
Holidays Fuel Surge Online Phishing Scams

Holidays Fuel Surge Online Phishing Scams

We’ve all been targeted in phishing attacks — fake messages from a seemingly trusted or reputable source designed to convince you to click on a malicious link, reveal information, give unauthorized access to a system or execute a financial transaction. It may come as...