by Paweł Wałuszko | Mar 27, 2020 | Guide, security
Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home...
by Paweł Wałuszko | Feb 24, 2020 | Guide
The 2013 Edward Snowden publicly confirmed something, which many of the IT experts were suspecting for years: the fact that an average computer makes for an excellent tool for spying on us. The media storm ensued. Soon afterward, a flurry of privacy-oriented products...
by Paweł Wałuszko | Jan 29, 2020 | Guide
During one of the online seminars conducted by CyberForces and Xopero on the topic of Internet security and social engineering, numerous attendees asked me to outline how encrypted e-mail works and how can one start utilizing it in their day-to-day operations. Since...
by Paweł Wałuszko | Dec 30, 2019 | Guide, lang-en
Anyone using YouTube lately has probably seen the all-prevalent ads: if you purchase a private VPN service, you’ll be safe online: your traffic will be fully encrypted, your ISP will not track you, on top of that, you’ll get access to content otherwise blocked in your...
by Paweł Wałuszko | Jul 22, 2019 | Guide, lang-en, security
Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment – whether...