POLICIES FIRST

All you need to know about regulations, mandatories and certification.

Employees as the first line of defense against threats: How to develop a human firewall

When speaking of digital security, many people tend to highlight the technological aspects: endpoint security, password managers, and encryption. While all of these are essential parts of building your company’s security,...

Never trust, always verify: Zero Trust explained

The term “Zero Trust” keeps making headlines, yet the idea behind this security model isn´t new at all. It has been around since the early days of the internet, but now it is celebrating its renaissance. What is Zero...

Checking an app’s security? Here are 8 things you shouldn’t forget

Before being installed and used by businesses or employees, any app should undergo a security check – be it translation apps, shared calendars, or messaging platforms. How should you make sure that the app is safe? Daniel...

7 types of apps that may endanger your data

How many apps do you have installed on your devices? We use apps for almost everything, from communication with others to writing down our shopping lists. However, some may be a threat to your data security and personal...

How to prepare your company for a cyberattack

As the experts say, it's not a matter of if a cyberattack will happen, but when. Most companies underestimate the value of a detailed contingency plan that can help them react immediately to malware, phishing, DDoS attacks...

IT security needs to play a central role in employee offboarding

When employees leave a company, predefined IT and HR processes for so-called offboarding are usually taken for granted. The process often involves, for example, returning access cards or hardware – fairly mundane tasks....

Open-Source Intelligence – Valuable source of information for IT specialists as well as attackers

The use of open-source intelligence (OSINT) is becoming increasingly important within IT security departments. OSINT includes the acquisition, collection, analysis and consolidation of information that is available from...

GDPR vs. CCPA: How do they affect businesses across the US?

Many US companies are also active on the European market. Thus, doing business in the European Union and its regulatory landscape raises a lot of questions about the differences and similarities between two core privacy laws...