All you need to know about regulations, mandatories and certification.

How to prepare your company for a cyberattack_cover

How to prepare your company for a cyberattack

As the experts say, it's not a matter of if a cyberattack will happen, but when. Most companies underestimate the value of a detailed contingency plan that can help them react immediately to malware, phishing, DDoS attacks and other types of online threats. Such a plan can help you react promptly and limit the damage caused by such attacks.

Employee offboarding_cover

IT security needs to play a central role in employee offboarding

When employees leave a company, predefined IT and HR processes for so-called offboarding are usually taken for granted. The process often involves, for example, returning access cards or hardware – fairly mundane tasks. However, that is not the case with IT security, which tends to be neglected. Possible consequences? Threats to security and undesirable data leakage.

OSINT_cover photo

Open-Source Intelligence – Valuable source of information for IT specialists as well as attackers

The use of open-source intelligence (OSINT) is becoming increasingly important within IT security departments. OSINT includes the acquisition, collection, analysis and consolidation of information that is available from publicly available sources such as the internet. For this reason, OSINT is a valuable tool for finding exploitable vulnerabilities in networks, web apps, social media, etc.


GDPR vs. CCPA: How do they affect businesses across the US?

Many US companies are also active on the European market. Thus, doing business in the European Union and its regulatory landscape raises a lot of questions about the differences and similarities between two core privacy laws – the CCPA and the GDPR. Read the following comparison to quickly find your way around.


How to Convince Your CEO to Invest in a VPN

More employees working from home means more information shared online, so creating an encrypted tunnel via a virtual private network (VPN) is a wise move. As an IT manager, you most likely know all about VPNs. However, that might not be the case for your boss, who controls the budget. If your CEO lacks the time to understand why some security measures for IT infrastructure are necessary, read on. We're sharing some basic arguments for investing in a VPN solution that might save you some endless debates.


Why Use a VPN Today? Key Benefits of Employing a Virtual Private Network

Usually, using a VPN in a company is nothing new for IT admins. Times have changed, however – and so has the path to effective security: It's no longer just about the in-house technology and devices. The rise of remote work and accelerated digitalization have made the VPN even more relevant. Here’s what the VPN gives you in return.

CPRA Proposition 24

Proposition 24 Has Passed, Creating a New Agency. Will the CCPA Become a Stronger Piece of Legislation?

If you haven't paid much attention to the California Consumer Privacy Act (CCPA), now is the time to care. The California Privacy Rights Act (CPRA) (or Proposition 24) adds stronger privacy protections to the act and establishes the California Privacy Protection Agency. What exactly is changing?


Encryption as a Must: How to Find the Right Solution for Your Business

Have you tried to deploy an encryption product but failed? Don’t give up. Without the right approach, you will find it difficult to secure your business data. And with the shift to remote working, the threat from unencrypted devices becomes greater. Even one stolen phone can jeopardize your business.