POLICIES FIRST

All you need to know about regulations, mandatories and certification.

Old routers, big problems: Do you know how to dispose of them properly?

Every company needs to dispose of old hardware from time to time; however, not many understand the security risks associated with it. A recent study conducted by ESET researchers found that out of 18 used routers purchased,...

8 types of apps that may endanger your data

How many apps do you have installed on your devices? We use apps for almost everything, from communication with others to writing down our shopping lists. However, some may be a threat to your data security and personal...

Employees as the first line of defense against threats: How to develop a human firewall

When speaking of digital security, many people tend to highlight the technological aspects: endpoint security, password managers, and encryption. While all of these are essential parts of building your company’s security,...

Never trust, always verify: Zero Trust explained

The term “Zero Trust” keeps making headlines, yet the idea behind this security model isn´t new at all. It has been around since the early days of the internet, but now it is celebrating its renaissance. What is Zero...

Checking an app’s security? Here are 8 things you shouldn’t forget

Before being installed and used by businesses or employees, any app should undergo a security check – be it translation apps, shared calendars, or messaging platforms. How should you make sure that the app is safe? Daniel...

How to prepare your company for a cyberattack

As the experts say, it's not a matter of if a cyberattack will happen, but when. Most companies underestimate the value of a detailed contingency plan that can help them react immediately to malware, phishing, DDoS attacks...

Cyber insurance? Why you need to focus on cyber resilience first

In recent years, the risk of getting attacked by cybercriminals has been steadily increasing, and as a consequence, cyber insurance represents a progressively more popular measure to mitigate the financial impact of potential...

IT security needs to play a central role in employee offboarding

When employees leave a company, predefined IT and HR processes for so-called offboarding are usually taken for granted. The process often involves, for example, returning access cards or hardware – fairly mundane tasks....