Skip to main content

Internet security threats to discuss

In our previous articles we have discussed some of the most burning internet security threats, and as of now, we thought it would be useful to make a summary of what we are aware of on the topic. 2017 was a year of several threats in the cyber world. WannaCry, Petya/NotPetya were just two examples of it, which we were discussing earlier. As we saw, the threats that occur nowadays have become more diverse, and hackers are working hard on discovering new ways to exploit the existing online security systems.

Share this post

Comments ()

The GDPR in our point of view

In our previous writings we have talked about the GDPR regulations in general, but as it is now a hotter topic than ever, we decided to share some more on the topic. The General Data Protection Regulation has been all over the news in the past few months. Some companies were more prepared than others, and disputes were present all over Europe on how to implement the necessary requirements before the deadline passes. GDPR changes how personal data is being handled, meaning that organizations will have to change their practices drastically if they want to avoid fines. But the regulation does not necessarily mean that one must panic. However, every company needs to increase their awareness of and preparedness for GDPR, it is not necessarily an impossible task.

Share this post

Comments ()

Why is VPN useful, and how to use it?

Today we dive into the topic of internet security again, and we are going to discuss the basics of VPN and the importance of it in business life. With the help of VPN, you can make the Internet safer, more secure and more private for yourself and your enterprise. But how does it work, and what are the most important aspects to it?

Share this post

Comments ()

Cultural differences in data security

The differences on what counts as private information are varying, depending on which country we are talking about. In the EU, for example, an address, an e-mail address or a phone number already counts as sensible information, and companies can only use it if you agree to the terms. However, the social security number is not that highly protected, meanwhile, in the USA that code is the most valid link to your personal life. This is a huge difference: While in the EU a hacker cannot do much with a single social security number, in the US they can even apply for a loan or steal your whole identity.

Share this post

Comments ()

Biggest security breaches of the 21st century

Previously, we were discussing the topic of inside security breaches that can be a threat to enterprises. In today’s article, we will go on and complete the list with some of the biggest and most famous outside security breaches of the 21st century. A secure network is a sign of a good IT staff, but when nothing happens, it is hard to notice that everything is working well. However, when something does happen, that is usually bad in terms of security-related issues. But what were the most famous threats, that made companies fall on their knees?

Share this post

Comments ()

How social engineering can be a security issue

Strong passwords, two-factor authentications, using different accounts: the basics of IT security might sound familiar to you. We have also been writing articles on the issues, but we have jet not covered a very important risk in IT security, namely social engineering. Let’s look into it, and discuss how we can fight it to protect ourselves.

Share this post

Comments ()