KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
What every Organization should know about the Accountability Obligation Every day, massive volumes of data are generated when consumers and businesses use the internet to conduct their business. Consumers are also becoming more skeptical about how businesses are utilizing and handling their personal data, and they place a higher value on trust and accountability than
13 phishing attack types and how to protect your business against them Phishing attacks have existed since the internet’s infancy. The earliest phishing attacks began in the mid-1990s, using AOL to collect passwords and credit card numbers. Today’s cybercriminals utilize increasingly sophisticated social engineering techniques. In essence, phishing is a social engineering attack that employs
Browser in the browser attacks: Why you should watch out A man-in-the-middle (MITM) attack involves a victim, a website with which the victim wishes to communicate (for example, a bank), and the attacker. The attacker establishes a connection between the victim and the targeted website in order to obtain personal information such as login credentials,
Cybersecurity for SMEs: What employees should know The employees are the first line of defense and key to any enterprise’s cybersecurity. Thus, we gathered some important tips that SME employees could practice and bear in mind in the workplace, whether working from home or in the office. Here are the four (4) reminders to employees: