Human or machine? Distinguishing between real and AI-generated content

More and more frequently, we hear about AI-generated phishing attacks that are indistinguishable from real emails and deepfake content that looks like written by professional journalists. In recent years, AI-based systems are continuously improving so that they can now independently generate content such as text, graphics, images and [...]

The Achilles Heel of Security Awareness Trainings: Reasons Why They Often Fail

In the dynamic landscape of cybersecurity, organizations invest significant resources in fortifying their digital defenses against an ever-evolving array of threats. The statistics that 85% of successful attacks are due to human error has lead organisations across the globe to finally realise the importance of training their employees [...]

Cybersecurity trends and challenges in 2024: the top game changers

As we usher in a new year, the cyber security landscape continues to evolve at an unprecedented pace, presenting both opportunities and challenges for organizations worldwide. Reflecting on the lessons learned in 2023 and anticipating the emerging threats of 2024, it becomes evident that only a proactive and adaptive [...]

Managed Endpoint Detection and Response (MEDR) – active reaction to critical malware incidents

Cyber security threats are growing in sophistication and precision by the minute, and it's becoming increasingly frequent for targeted attacks to bypass the obligatory preventative mechanisms such as antivirus, firewalls and endpoint protection. Although more and more companies are planning security awareness training aimed at enabling their employees [...]

By |2023-12-06T14:31:17+00:00December 6, 2023|blog, Email Security, Malware Protection|0 Comments

How to turn your email signatures into an effective and free marketing tool

You seek to take full advantage of all free marketing opportunities to reach customers and partners? Undoubtedly, corporate email is great for this purpose, but there is one of its features whose potential you are probably not exploiting entirely - signatures. Your business email correspondence goes out every day [...]

Create GDPR-compliant email signatures

What must companies take into account when sending e-mails? The legal regulations strengthening data protection require every company to implement numerous adjustments when handling data and providing information. These measures also include making its email signatures GDPR-compliant. If email signatures were until recently just a good way to [...]

Optimise email signatures for dark mode

Many users enjoy the flexibility to customise the user interface according to their preferences. A relatively new user interface design that is gaining popularity is the dark mode. It is now available on most software programs on various devices. This feature allows the user to partially invert the [...]

Threats and tendencies that will dominate cyber security in 2023

11 factors that will shape cyber security next year Nobody really expects cyber attacks to decline in near future, but 2022 has finally brought some much-needed changes in the mindset towards cybersecurity. As thousands of people experienced the severe consequences of critical infrastructure breaches and disruption to public sector [...]

New and more treacherous methods of ransomware attacks: intermittent encryption and how you can reliably protect yourself from it

The most frequently used gateway for cyber-attacks is still e-mail. That is where a never-ending technological battle between attackers and defenders is taking place. But despite big efforts by experts and ever greater investments by companies, the cyber criminals always seem to stay one step ahead. And they succeed [...]

By |2022-11-30T11:56:21+00:00November 30, 2022|blog, Email Security, Malware Protection|0 Comments

Do you have what is needed for a successful implementation of DLP technology?

Information security relates to dataThe proper use and protection of information lies at the core of the entire information and cybersecurity domain. And information is generated when working with data. It is therefore quite clear that everything in the information security domain relates to data. But data is not [...]

By |2023-11-23T16:04:04+00:00October 13, 2022|blog, Data Loss Prevention, Data Protection|0 Comments
Go to Top