Skip to main content

The most common internal security breaches - Volume 2

In our last article, we started summarising the most common and most dangerous insider threats for small and medium-sized enterprises (SMEs). We wrote about angry employees with privileged system access to the company networks, colleagues who surf on the internet and download unwanted spying programmes, viruses or other malware, and co-workers who break the law by doing illegal activity on company property.

Share this post

Comments ()

The most common internal security breaches - Volume 1

Criminal attacks might happen to a company from outside sources, or from the inside. Most of the time employees pose a great risk and raise the likelihood of a cyber-attack by their daily routines. Small and medium-sized enterprises (SMEs) are especially vulnerable to these IT security breaches, as they may lack sophisticated methods and monitoring systems used by large corporates.  Also in some cases, they may lack the understanding of nature of incoming threats.

Share this post

Comments ()

What is one-time-password?

In connection with the previous article about the importance of strong passwords and 2-factor authentications we felt the need to dig a little deeper into the topic of OTP (One Time Passwords), and write about time based one-time password (TOTP) and HMAC based one-time password (HOTP) algorithms. As we explained earlier, during 2-factor authentications there are 2 tokens to be provided: one we are all familiar with is the username and the password, while the other one is a secret token that is not known to the public. When it comes to the 2nd factor of authentication mechanisms, usually OTP is used as a protective mechanism.

Share this post

Comments ()

Secure communication online

Communication carried out in online space can be dangerous. If it is not secured properly, or not secured at all, an unwanted 3rd party can listen in at any time, and it can gather otherwise sensitive information. To avoid this, most of the websites use a form of secure communication, which is mainly an HTTPS protocol. Secure communication includes methods by which people can share information with certainty that it will not get to unwanted parties.

Share this post

Comments ()

The importance of secure passwords and two-factor authentications

12345, Password, Qwerty: is one of these words familiar to you? Perhaps you use them as real-life passwords in your everyday routine for your Facebook, Gmail, computer or cloud storage system? But is it worth having easy-to-remember phrases to guard all your personal information? Weaker passwords mean an easier way to enter your account not only for you but for hackers as well.

Share this post

Comments ()

The importance of secure data storing

Data is the heart of business. A thirst for information drives the world and cloud-based options make it easy and manageable to store huge amount of data at one place. However, space is not the only thing that is worth paying for. In the long run, storing data in the cloud with safety measurements is the most reliable solution.

Share this post

Comments ()

How Meltdown and Spectre can affect you

In January, cyber-world was spinning around two critical CPU vulnerabilities called Meltdown and Spectre. They are both hardware bugs that can allow attackers to steal information from the memory of other programs. Both Intel, AMD, and several other brands are included in one or the other attack. Attention started to focus on the problem after Intel was included in Meltdown related situations, but with the appearance of Spectre AMD and AMR were involved as well.

Share this post

Comments ()

Physical requirements of cloud-based solutions in server parks

Do you know where your data is kept? Data is one of the most important aspects of our everyday lives. But do you really know how and under what circumstances it is stored in the cloud? Let us introduce you the physical aspects of cloud-based servers by describing the main features one must implement when operating a server park.

Share this post

Comments ()

Digital Nomads: How to become one and travel the world?

Travelling the globe while getting paid to do what we love sounds like the ideal life to live. Achieving this was quite difficult before, as office work is usually liked to one specific location. However, with today’s leading changes in technology, it has become much easier to work form the distance and be connected to your colleagues. Being a freelancer is also a good way to achieve this dream as work can be done from all parts of the world.

Share this post

Comments ()

DocuBank - Professional package


Professional document management, with hardware access protection. High-class document management for small and medium businesses. Let effective and easy document handling become reality at your company.