Blog

Gearing up for safe remote work

Gearing up for safe remote work

Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home...

How CEOs fall victim to hackers. The example of Jeff Bezos

The 2013 Edward Snowden publicly confirmed something, which many of the IT experts were suspecting for years: the fact that an average computer makes for an excellent tool for spying on us. The media storm ensued.  Soon afterward, a flurry of privacy-oriented products...

Encrypted e-mail for private use. All you need to know

Encrypted e-mail for private use. All you need to know

During one of the online seminars conducted by CyberForces and Xopero on the topic of Internet security and social engineering, numerous attendees asked me to outline how encrypted e-mail works and how can one start utilizing it in their day-to-day operations. Since...

VPN for private use – a good idea?

VPN for private use – a good idea?

Anyone using YouTube lately has probably seen the all-prevalent ads: if you purchase a private VPN service, you’ll be safe online: your traffic will be fully encrypted, your ISP will not track you, on top of that, you’ll get access to content otherwise blocked in your...

Social engineering techniques used by hackers

Social engineering techniques used by hackers

“If the door is locked, try the window” — that’s the motto, used by more and more cybercriminals, unfortunately, successful. Just replace “the door” with “the system security” and “the window” — with employees. Today we will talk about techniques that hackers use to...

Mobile security in a business environment

Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment – whether...