Blog - Paweł Wałuszko



Whaling and CEO Fraud: a case for company culture

Whaling – phishing attack aimed at top managers and C-level executives CEO Fraud – a social engineering attack in which the attacker impersonates a C-level executive When someone thinks of a phishing attack, chances are they’re envisioning a simple, poorly-written message, littered with spelling and grammatical errors. Oftentimes this message...


Ransomware – to pay or not to pay

Ransomware – type of malware which threatens to publish the victim’s data online or prevents the user from accessing their files without paying a ransom. Most commonly utilizes file encryption methods to achieve its goals. Ransomware – a threat to companies Ransomware is a lucrative business. Once the malware is...


Remote work, BYOD and corporate network security

It’s safe to say that BYOD (Bring Your Own Device) trend has never really caught on. Back in early  2010s numerous tech-oriented news outlets expected somewhat of a ‘how-we-conduct-business revolution’, but in reality, very few businesses actually embraced the model of employees using their personal devices for work purposes. Perhaps...


Gearing up for safe remote work

Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home a ready-to-use device, with all software pre-configured...


VPN for private use – a good idea?

Anyone using YouTube lately has probably seen the all-prevalent ads: if you purchase a private VPN service, you’ll be safe online: your traffic will be fully encrypted, your ISP will not track you, on top of that, you’ll get access to content otherwise blocked in your country. For a few...


Mobile security in a business environment

Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment – whether the IT department is...

1 2