5 ways the four-eyes principle protects your sensitive data

The power of double-checking with four-eyes principle Ensures high level of security and transparent accountability Every organization needs to protect its data, particularly the sensitive information that greatly affects its performance, image and profit. It is not only inbound email threats such as spam and malware that compromise [...]

Top Cybersecurity Threats for 2022 – An Outlook

What threats will carry over from 2021 to 2022? A lot of trends from 2021 will continue in 2022 Those who believed that spending a good deal of money on the latest security software would ensure their company was fully protected from future cyberattacks have surely already realized [...]

By |2022-11-02T14:23:55+00:00January 10, 2022|blog, Collaboration EN, Email Security|0 Comments

Log4j – one of the most dangerous vulnerabilities in the last few years!

Log4j allows access to server iQ.Suite is not vulnerable Log4j has become interestingly popular in the last several days, unfortunately for the wrong reasons. On the 9th of December, a critical vulnerability was discovered in Apache configurations using the Log4j library – CVE-2021-44228. This vulnerability scores 10 out [...]

By |2022-11-02T13:00:34+00:00December 16, 2021|blog, Email Security|0 Comments

Demystifying DLP – a concept that loves rules

Why does DLP fail to become a security standard? The DLP concept suggests that data flow should be monitored and controlled The Concept DLP (Data Loss Prevention)– a term that has been around for more than 15 years, but still fails to establish itself as a proven and trustworthy [...]

By |2022-10-14T17:15:12+00:00December 8, 2021|blog, Data Loss Prevention, Data Protection|0 Comments

Emotet strikes again

Computers infected with TrickBot are at risk The German Federal Criminal Police Office (BKA) calls it the “most dangerous malware in the world” Not even a year has passed since Emotet was officially shut down by authorities in January 2021, when security researcher Brad Duncan reported its return. [...]

By |2022-11-02T15:24:53+00:00November 25, 2021|blog, Email Security|0 Comments

Online discussion “Email Encryption with S/MIME and PGP” with our security expert Dr. Rolf Kremer

Host of the discussion is the Tuesday Afternoon Club, dedicated to algorithmic challenges. DIGITALL has the pleasure to invite you to the online discussion “Email Encryption with S/MIME and PGP” presented by the cyber security expert Dr. Rolf Kremer, VP R&D of GBS Europa, which is part of [...]

By |2022-09-18T16:14:02+00:00November 24, 2021|blog, Encryption|0 Comments

Security incident: Sending sensitive data to the wrong recipient

An incident that happens more often than we realize 90% of employee communication takes place via email making it the main channel for a data leaks When we talk about cybersecurity, we often think only in terms of defense. We believe that we have something in the digital [...]

By |2022-11-02T15:26:26+00:00November 8, 2021|blog, Data Protection|0 Comments

Business Email Compromise – the most expensive email attack

BEC is much more dangerous and costly than phishing BEC is mostly used for invoice or payment fraud Business Email Compromise (BEC) is yet another attack tactic that has been on the rise in the last several years. According to different studies and researchers (e.g. FBI Crime Complaint [...]

Supply Chain Attacks on the rise

Enterprise Security Practices for Exchange and Office365 Our level of protection is as good as that of our partners and suppliers The last couple of years, and especially 2021, have been marked by several huge attacks on service providers and vendors. Some of the most notable ones are the attacks [...]

By |2022-11-02T15:29:11+00:00October 27, 2021|blog, Email Security, Supply Chain Attacks|0 Comments

Protection of collaboration platforms with iQ.Suite 360

Securing collaboration platforms with an innovative approach iQ.Suite 360 can overcome the limitations of Microsoft Defender In the previous part of our series on protection of collaboration platforms, we presented the functionalities integrated in Office 365 that Microsoft offers. In this article, we will reveal how the limitations of [...]

By |2022-11-02T15:31:35+00:00October 12, 2021|blog, Collaboration EN|0 Comments
Go to Top