The advantages that IT offers can be used against you more than ever by hackers, for example. Do you stick to a one-off scan? Or does your organization need to be secured at all times? Turn it into policy with Vulnerability Management. Why is Vulnerability...
By October 2024, all companies must comply with the NIS2 guideline. Does it also relate to the security of your data? Chances are, because the scope of NIS2 is a lot bigger than its predecessor. In this blog we explain what the guideline...
VEEAM has been a profit maker for years with backup for Windows 365. But for such an essential product, it actually has surprisingly few users. Since the first backup for Windows 365 saw the light of day in 2016, the product has been used 210.000 times...
Encryption is good business these days. But most of all necessary. For the protection of your passwords, for example. You can store encrypted passwords with a password manager. For safety, but there are 2 more important reasons: for speed and…
ChatGPT is a tool with unprecedented impact. The chatbot is amazingly good at generating texts on just about any subject. Due to the attractiveness, the risks sometimes remain underexposed. Generating texts usually works fine, but beware if...
This week it was announced that malware in well-known VOIP software has penetrated deeply into Dutch organizations. An edited version of telephony software 3CX was found to contain malware. With a simple check you can be sure that you will not be the next victim. The...