Category security

Criminals don’t play by the rules

Criminals don’t play by the rules There are all sorts of measures you can take to prevent hackers from gaining access to your system. These are sometimes complicated procedures. For example, there is a security structure, in which modifying protected…

Beware of software-based security!

Beware of software-based security! It may sound like an open door, but we don’t always realize it: virtual is synonymous with “not real” or “a reality created in memories of computers. Too often we think of “virtual” as reality, but…

The account of ransomware

The account of ransomware In our previous blog, we already discussed two major costs in the event of a successful ransomware attack. Because of downtime – the time you are not operational – costs quickly skyrocket, averaging 23 times the…

Multifactor authorization can also be cracked

Multifactor authorization can also be cracked Recently in the news: the American Institute for Cybersecurity discovered that hackers got through multifactor authorization. You know the system when you log into your bank, for example: after logging in, you get another…

Be aware of vulnerabilities in your software

Be aware of vulnerabilities in your software Amnesia:33 is the name of Forescout’s research result, on vulnerabilities in widely used Open Source software. Seven products commonly used in network connectivity and communications between devices were examined; four software packages contained…

Subscribe for tips and info

We regularly write blogs on current topics from the world of digital storage technology. Sign up here to be notified about new blogs.