Hit enter to search

Author Avatar

Where are you with your ransomware recovery strategy? Step 1: Perimeter strategy

Only with a good IT strategy with a proactive security strategy and a proactive disaster recovery plan you can increase your chances of withstanding a ransomware attack. Discover how.

Read More
Author Avatar

This is what hackers really love

Why do hackers choose your company? How do they prefer to hack and which assets do they prefer to attack? It's all in the new HackerOne report.

Read More
Author Avatar

How to increase your security with patch management

Patching different releases on your systems is a lot of work. Discover how patch management will facilitate your work.

Read More
Author Avatar

Why ransomware should concern you

Ransomware is growing. In size, in scale, in finesse. It is one of the greatest cyber security threats companies are facing right now. Here is an example and some handy tips.

Read More
Author Avatar

Why your firm should invest more in security

If you’re not convinced by the fact that two thirds of all SME’s already had to endure a cyberattack, I’ll try to convince you: securing your firm is worth looking into and I’ll show you how.

Read More
Author Avatar

Ransomware is it still a threat ? How does it work?

Ransomware is not especially complicated to code. There are plenty of open source projects for attackers to choose from. There is real business out there called Ransomware-as-a-Service where...

Read More
Author Avatar

Why patching PuTTY is so important

In order to connect to your cloud server, networking devices, ... PuTTY is one of the most widely used open-source SSH clients, so why is it vulnerable? I'll explain here what you can do.

Read More
Author Avatar

Your 10 essential GDPR requirements - Part 2

The authorities are getting up to speed in handling compliants and breaches, and yes, they do impose fines. Here is your checklist, in simple wording, what it takes to make you as compliant as...

Read More
Author Avatar

Onboarding of a client on the safe2be platform

We're quite proud of our latest onboarding project. Let's have look at the implementation process and the results.

Read More
Author Avatar

Your 10 essentail GDPR requirements - Part 1

The authorities are getting up to speed in handling complaints and breaches, and yes, they do impose fines. Here is your checklist, in simple wording, what it takes to make you as compliant as...

Read More

Current job openings

We are constantly looking for new colleagues!

If you share our values and you're looking for a challenging job in Belgium's Best Workplace, visit our website.

Apply now

Get our top stories in your inbox every month

Follow us

  

Share this article