Our Blog

Home / Blog

Package for you. Please scan the QR code

Package for you. Please scan the QR code

How cybercriminals extract bank card details pretending to be DHL. Online shopping is now an established part of daily life: we get food, clothes and other goods delivered to our door in a couple of clicks. Online shopaholics, of which there are many, are may...

ZTNA is key to securing the hybrid workforce

ZTNA is key to securing the hybrid workforce

Zero Trust Network Access (ZTNA) provides remote users with an alternative to slow and clunky VPNs for accessing private business applications.  However, not all ZTNA solutions are created equal.  In addition to identity-based access control, Zero Trust requires...

Top 3 Reasons to Use Endpoint Data Loss Prevention

Top 3 Reasons to Use Endpoint Data Loss Prevention

The primary tool of today’s business environment is the computer. Whether a desktop or laptop, running on Windows or macOS, these are the devices employees spend most of their working hours in front of and on which they access sensitive information. They are...

$2 million inventory hacked in CS:GO

$2 million inventory hacked in CS:GO

An unnamed hacker allegedly stole two million dollars’ worth of items from a CS:GO player’s backpack and has already started auctioning off the items. What the hack?! On June 21, a Twitter user who goes by the name of ohnePixel report that $2,000,000+ worth of CS:GO...

The Psychology of Cybercrime

The Psychology of Cybercrime

A good criminal needs to know what makes people tick. There is a great deal of psychology involved in criminal activities - especially when it comes to establishing contact with potential victims. Many cyberattacks are successful because cyber criminals misuse human...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo