BLOG
We simplify vulnerability assessment and patch management to secure your company.
- All
- Cyberssecurity
Why endpoint security is important for an increasingly mobile workforce
The Covid pandemic has encouraged more employees to adopt a remote or hybrid working culture. According to a survey, 59% of European employees were allowed to work from home in the past 2 years. The work-from-home culture will likely stay despite the easing of restrictive measures in Europe. And along with it, growing endpoint security concerns.
Ransomware – Did we learn from the past?
Ransomware continues to evolve as cybercriminals resort to newer cunning tactics. But ransomware attacks often result in far more devastating damages than a locked screen. Many managers dread coming to work only to find themselves denied computer access.
European Parliament Approves NIS2 Directive – Are You Prepared?
NIS2 introduces significant changes, policies, and strategic responses to the European cyber security landscape. Once enacted, member states have up to 21 months to reform their national cybersecurity laws in line with the NIS2. In other words, European companies that fall within NIS2’s provision must prepare themselves for the new reforms by 2024.
Cisco Warns of AnyConnect Vulnerability Exploitations
A high-risk vulnerability, filed under CVE-2020-3433, allows hijackers to launch DLL attacks after gaining access to the targeted device. A DLL attack involves injecting malicious codes into the DLL files, which the applications will load at run time.
Top Vulnerabilities That Jeopardize Your Company’s Security
The apps and programs run by your company can expose you to common vulnerabilities that can jeopardize your cyber security. This makes it critical that you understand the common sources of vulnerabilities, preventive measure and perhaps a remediation tool to secure your company.
The Covid pandemic has encouraged more employees to adopt a remote or hybrid working culture. According to a survey, 59% of European employees were allowed to work from home in the past 2 years. The work-from-home culture will likely stay despite the easing
Ransomware continues to evolve as cybercriminals resort to newer cunning tactics. But ransomware attacks often result in far more devastating damages than a locked screen. Many managers dread coming to work only to find themselves denied computer
NIS2 introduces significant changes, policies, and strategic responses to the European cyber security landscape. Once enacted, member states have up to 21 months to reform their national cybersecurity laws in line with the NIS2. In other words, European
A high-risk vulnerability, filed under CVE-2020-3433, allows hijackers to launch DLL attacks after gaining access to the targeted device. A DLL attack involves injecting malicious codes into the DLL files, which the applications will load at run
The apps and programs run by your company can expose you to common vulnerabilities that can jeopardize your cyber security. This makes it critical that you understand the common sources of vulnerabilities, preventive measure and perhaps a remediation tool to