Blog
The Trust Issue
Have you ever considered the amount of trust that is needed to acquire goods or services? As our partner Knowbe4…
I have accessed to a network, but what about now?
After gaining access to a business network, it is important to prioritize what is your goal or better know what…
Teleworking safely
During these fateful days, we are all fighting against coronavirus (CoVid-19) by staying at home and extreming precautions. In that…
The importance of software updates – Travelex
Hackers don’t care if it is your birthday, Christmas or New Years Eve. That’s what the UK foreign currency firm…
Travel safely, please!
Usual traveler? Do you commonly travel because of business? The bad news is that you are vulnerable! Business travelers are…
Your iPhone is (in)secure
iPhone is considered the most unhackable smartphone, especially thanks to the fact that it is a closed OS so nobody…
Don’t feed the Phish!
As you all should know nowadays, a phishing attack is a fraudulent attempt to obtain sensitive information such as usernames,…
Steganography and Cyberattacks
What is steganography? It consists in concealing a message within another message. It is a combination of two Greek words:…