Understanding the five key phases of a hacking attack to fortify your business IT

The term ‘Hacking’ has been in the public consciousness for decades and the activities of the nefarious individuals...

29.11.2023

Your guide to NIS2 and what it means for your organisation’s cybersecurity

Failures or impairments of critical infrastructure can result in supply shortages, disruptions to public safety or...

14.11.2023

Why SMBs are most vulnerable to cyber attacks and how you can be better prepared

Any type or size of business or organisation can suffer a cyber attack, but the impact is often more severe for small...

06.11.2023

1,000 days of GDPR: what have businesses learned?

GDPR compliance can be challenging. Streamline your efforts and reduce your risk of non-compliance with an...

21.06.2022

GDPR 2021: data protection and access to personnel files

Dealing with personal data, such as that of employees and customers, is often an unforeseen difficulty for SMEs...

08.04.2021

Safe workplace – well-protected, secure working

Whether your new office is at home, you have a conventional office at the company, or a mixture of the two: security...

25.01.2021

How remote work is transforming cybersecurity

As organizations of all sizes extend their commitment to supporting remote workforces for the future, cybersecurity...

29.09.2020

Backup management: every business needs an emergency exit

Losing data can be catastrophic for any business. So it is crucial to protect yourself against loss and invest in...

25.10.2019

Data security now

Why is data security so important to SMEs? And what does a comprehensive information security concept involve?

28.08.2019

Data security: how SMEs protect company data

IT security, information security and data security are three terms to describe the same important task: in times...

04.07.2019