Hit enter to search

Author Avatar
03/09/2019

The VDI compromise: satisfied users or adequate security?

Working anytime and anywhere, that’s what end users want. But, you as an IT security professional, want to be certain your employers are protected in the Virtual Desktop Infrastructure (VDI)...

Read More
Author Avatar
20/08/2019

Security Hardening Audit for dummies

How does it work? Which score will you get? We'll explain it here!

Read More
Author Avatar
07/08/2019

Where are you with your ransomware recovery strategy? Step 3: Backup & Recovery Strategy

We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.

Read More
Author Avatar
30/07/2019

Where are you with your ransomware recovery strategy? Step 2: End Point & Server Protection Strategy

Protecting physical desktops & laptops are a challenge in a daily administrator tasks. Physical desktops & laptops have the of being de-centralized. Centralizing your end-points in a data center...

Read More
Author Avatar
24/07/2019

Where are you with your ransomware recovery strategy? Step 1: Perimeter strategy

Only with a good IT strategy with a proactive security strategy and a proactive disaster recovery plan you can increase your chances of withstanding a ransomware attack. Discover how.

Read More
Author Avatar
18/07/2019

This is what hackers really love

Why do hackers choose your company? How do they prefer to hack and which assets do they prefer to attack? It's all in the new HackerOne report.

Read More
Author Avatar
03/07/2019

How to increase your security with patch management

Patching different releases on your systems is a lot of work. Discover how patch management will facilitate your work.

Read More
Author Avatar
11/06/2019

Why ransomware should concern you

Ransomware is growing. In size, in scale, in finesse. It is one of the greatest cyber security threats companies are facing right now. Here is an example and some handy tips.

Read More
Author Avatar
20/05/2019

Why your firm should invest more in security

If you’re not convinced by the fact that two thirds of all SME’s already had to endure a cyberattack, I’ll try to convince you: securing your firm is worth looking into and I’ll show you how.

Read More
Author Avatar
17/05/2019

Ransomware is it still a threat ? How does it work?

Ransomware is not especially complicated to code. There are plenty of open source projects for attackers to choose from. There is real business out there called Ransomware-as-a-Service where...

Read More

Current job openings

Get our top stories in your inbox every month

Follow us

  

Share this article