Skip to main content

Internet security threats to discuss

In our previous articles we have discussed some of the most burning internet security threats, and as of now, we thought it would be useful to make a summary of what we are aware of on the topic. 2017 was a year of several threats in the cyber world. WannaCry, Petya/NotPetya were just two examples of it, which we were discussing earlier. As we saw, the threats that occur nowadays have become more diverse, and hackers are working hard on discovering new ways to exploit the existing online security systems.

Share this post

Comments ()

The GDPR in our point of view

In our previous writings we have talked about the GDPR regulations in general, but as it is now a hotter topic than ever, we decided to share some more on the topic. The General Data Protection Regulation has been all over the news in the past few months. Some companies were more prepared than others, and disputes were present all over Europe on how to implement the necessary requirements before the deadline passes. GDPR changes how personal data is being handled, meaning that organizations will have to change their practices drastically if they want to avoid fines. But the regulation does not necessarily mean that one must panic. However, every company needs to increase their awareness of and preparedness for GDPR, it is not necessarily an impossible task.

Share this post

Comments ()

Is it time for a change in your security methods?

It is natural that you want all the best for your company. You do everything to protect it, however sometimes the familiar, slightly out of date methods are the ones that are stopping you from achieving your goal. You want to protect data, information and company strategies from the outside world, and you also want to eliminate risks as much as possible. However, there are always steps for improvement when it comes to online security and sticking to your own methods might not be helpful after all.

Share this post

Comments ()

Twitter and end-to-end encryption

Sometimes we wander off to the most recent news about issues regarding the internet security. This is the case today as well, as we are going to discuss Twitter and its new feature, including end-to-end encryption.

Share this post

Comments ()

Advantages of EU based data servers

With the rise of new regulation standards, like the GDPR one can raise the question of what the differences are in keeping data inside the EU or outside, in the US. As the regulations on data protection are getting more serious in the EU, more and more companies are deciding to keep their personal and company-related data on EU based data servers that provide more safety for them.

Share this post

Comments ()

Most recent hacker attacks

2017 was not a lucky year for cybersecurity. To be precise, it was one of the worst years, according to countless critical reviews. Most of the attacks were able to happen because companies do not pay enough attention to their cyber hygiene. There is a tendency of poorly protected servers and admin accounts, and this makes the job really easy for hackers. The cyberattacks highlighted the alarming vulnerability of our personal information, but which were these attacks? Today we summarised the most burning ones from the most recent period.

Share this post

Comments ()

Discussing AES-256 encryption method

At Docubank we use the AES-256 method for our end-to-end encryption service. The method has a long history, it gained fame after it was first used by the US government to protect classified information. Since then it has been spreading around the globe and is used for securing sensitive data in various industries. Today we share some basics about AES encryption to understand its role in securing sensitive files.

Share this post

Comments ()

The basics of credit card hacking

As nowadays fund transfers and online shopping are taking up a huge majority of our finances, the number of related of frauds are on the rise as well. Today we dive into the topic of credit card hacking. We will discuss vulnerabilities in credit and debit card functionality that can help hackers steal data.

Share this post

Comments ()

Biggest security breaches of the 21st century

Previously, we were discussing the topic of inside security breaches that can be a threat to enterprises. In today’s article, we will go on and complete the list with some of the biggest and most famous outside security breaches of the 21st century. A secure network is a sign of a good IT staff, but when nothing happens, it is hard to notice that everything is working well. However, when something does happen, that is usually bad in terms of security-related issues. But what were the most famous threats, that made companies fall on their knees?

Share this post

Comments ()

How e-mail hacking works?

E-mail hacking is on the rise for companies, and this is not a surprise. As businesses go digital, e-mail data is becoming more valuable for hackers. SMEs and big corporations are being attacked as well, and the impacts can be very serious in every case. There are however reliable ways to prevent email hacking and reduce their impact.

Share this post

Comments ()