Since we dealt with Microsoft Defender as virus protection for private individuals in the first article, the second part will…
In order to protect company computers in the home office, new measures must be taken to counter the danger…
Since the lockdown, remote work and home office have become an integral part of our everyday lives - we now…
People today have not only an analog, but also a digital identity: You meet up with friends in social networks,…
In today's blog post, we are once again focusing on the topic of passwords and security: After all, password-based login…
Supply chain attacks, i.e. attacks on the supply chain, are a trend that has been going on for several years…
The numerous successful cyber attacks in recent months make it abundantly clear: IT security teams need insight into how users…
Internet Shopping Is Becoming More And More Popular At the same time, the thriving online trade and parcel boom is…
The centralized department responsible for securing valuable company data and digital infrastructure within any organization is known as a Security…
The advantages of using augmented reality solutions are obvious. With the help of wearables, employees can carry out their work…