Blog - Paweł Wałuszko

 

Guide

Why passwords are not enough?

When it comes to computing, the concept of “logging in” has been around since approximately 1961, when in the days of boxy mainframe computers, a clever engineer came up with the idea of password-protecting the machine by issuing a login prompt. The first operating system to utilize this function was...

security

Whaling and CEO Fraud: a case for company culture

Whaling – phishing attack aimed at top managers and C-level executives CEO Fraud – a social engineering attack in which the attacker impersonates a C-level executive When someone thinks of a phishing attack, chances are they’re envisioning a simple, poorly-written message, littered with spelling and grammatical errors. Oftentimes this message...

security

Ransomware – to pay or not to pay

Ransomware – type of malware which threatens to publish the victim’s data online or prevents the user from accessing their files without paying a ransom. Most commonly utilizes file encryption methods to achieve its goals. Ransomware – a threat to companies Ransomware is a lucrative business. Once the malware is...

Guide

Remote work, BYOD and corporate network security

It’s safe to say that BYOD (Bring Your Own Device) trend has never really caught on. Back in early  2010s numerous tech-oriented news outlets expected somewhat of a ‘how-we-conduct-business revolution’, but in reality, very few businesses actually embraced the model of employees using their personal devices for work purposes. Perhaps...

Guide

Gearing up for safe remote work

Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home a ready-to-use device, with all software pre-configured...

1 2