Blog
Get the latest developments in the IT sphere
Categories
Archives
Are your business printers protected against hacks?
When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers
3 Hats a hacker might wear
While not always accurate in its portrayal of hackers, Hollywood does get at least one thing right: there are many types of hackers out there,
3 Types of hackers you should know about
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings
What are the risks of BYOD?
The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases
It’s time to redefine the word “hacker”
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings
2016’s possible security problems
As shown by recent high-profile hacking scandals – targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison – cyber crime shows no sign