Understanding the five key phases of a hacking attack to fortify your business IT

The term ‘Hacking’ has been in the public consciousness for decades and the activities of the nefarious individuals...

29.11.2023

Your guide to NIS2 and what it means for your organisation’s cybersecurity

Failures or impairments of critical infrastructure can result in supply shortages, disruptions to public safety or...

14.11.2023

Why SMBs are most vulnerable to cyber attacks and how you can be better prepared

Any type or size of business or organisation can suffer a cyber attack, but the impact is often more severe for small...

06.11.2023

Are you confident in the security of your printers?

If your printers could talk, imagine the secrets they could share. Even though these devices are the conduit between...

08.06.2023

1,000 days of GDPR: what have businesses learned?

GDPR compliance can be challenging. Streamline your efforts and reduce your risk of non-compliance with an...

21.06.2022

Start your Industry 4.0 transformation: automate quality inspections with video analytics

Industry 4.0 technologies like video analytics are becoming more affordable, enabling smaller manufacturers to start...

17.12.2021

Video analytics: smart solutions that bring everything into focus

Video surveillance is a useful tool for monitoring workplace safety and security. Imagine if it could also alert you...

10.12.2021

GDPR 2021: data protection and access to personnel files

Dealing with personal data, such as that of employees and customers, is often an unforeseen difficulty for SMEs...

08.04.2021

Safe workplace – well-protected, secure working

Whether your new office is at home, you have a conventional office at the company, or a mixture of the two: security...

25.01.2021

AI in cybersecurity – a game of thrones

The development in technology is progressing continuously. Ransomware and other cyber threats do not constitute an...

16.12.2020