You thought you always immediately remove the phishing messages from your Inbox? Let's see if that is still the case in 2024. In 2024, phishing will become less recognizable, more vicious and it will become active in places where you least expect it. Conclusion: these 3 factors ensure...
Resources
Aumatic's Blog
Aren't you concerned with trends and insights in IT on a daily basis? We do!
One time view: send once, immediately forget
Are you careful when sharing images at work? Keep it like that. It is important to realize that messages, photos and videos are often stored for a long time. Without your knowledge. And if you're unlucky, they may be shared without your knowledge and someday...
How AI does and doesn't make life easier
Whether you have reservations or not; AI will change society. Models like ChatGPT change the way we communicate, design, program, visualize and so on. Cyber Security is also on the eve of a revolution through AI. In...
Now you still work with the laptop. When will the laptop start working for you?
Tapping on a keyboard is so 2023. At least, if we can believe trend watcher Richard van Hooijdonk. Will you soon be thinking up assignments that your laptop will then pick up? On November 16 he will think about it with all the guests at the Aumatics Customer Day. The future of...
Open XDR: Enterprise Security for Everyone
Our Solution Partner WatchGuard has acquired CyGlass. We don't often start a blog with acquisition news, but this one is significant. It opens the gate to large-scale rollout of Open XDR. This makes the acquisition very good news for SMEs...
Ransomware: don't become the next KNVB
If your organization is in the news because of ransomware, things are very wrong. It happened to the KNVB this week. The football association is up to its neck in theft of a lot of sensitive data. Prior to a successful hack, you have the opportunity to prevent damage as much as possible....
Take IT Security seriously with Vulnerability Management
The advantages that IT offers can be used against you more than ever by hackers, for example. Do you stick to a one-off scan? Or does your organization need to be secured at all times? Turn it into policy with Vulnerability Management. Why is Vulnerability...
What is the NIS2 guideline and what does it require of you?
By October 2024, all companies must comply with the NIS2 guideline. Does it also relate to the security of your data? Chances are, because the scope of NIS2 is a lot bigger than its predecessor. In this blog we explain what the guideline...
Backup is often missing with Microsoft 365. Are you part of that?
VEEAM has been a profit maker for years with backup for Windows 365. But for such an essential product, it actually has surprisingly few users. Since the first backup for Windows 365 saw the light of day in 2016, the product has been used 210.000 times...
Is saving passwords not your hobby? That's how you get rid of it.
Encryption is good business these days. But most of all necessary. For the protection of your passwords, for example. You can store encrypted passwords with a password manager. For safety, but there are 2 more important reasons: for speed and…