
What is a phishing attack? Everything you need to know
Phishing is one of those sneaky ways that can fool even the most vigilant. Cybercriminals don’t forcibly break in – instead, they pretend to be the bank, office or company...
miejsce, gdzie dzielimy się wiedzą o innowacjach, trendach IT


Phishing is one of those sneaky ways that can fool even the most vigilant. Cybercriminals don’t forcibly break in – instead, they pretend to be the bank, office or company...

Each of us uses many online accounts and platforms that are protected only by a thin barrier – our password. We often approach the subject of passwords routinely, not realizing...

An SLA is not an ordinary type of contract. It is a promise from the supplier to the customer that services will be provided at the highest level. We’ll bring...

In a cyber world full of threats, concepts such as Whaling and Business Email Compromise are no longer just abstract technological terms and are becoming real challenges for businesses. Anyone...

The financial sector in the European Union is facing another major regulatory change – the DORA (Digital Operational Resilience Act) regulation. All indications are that if your company operates in...

Operational continuity and data protection are integral components of IT asset management. Redundancy mechanisms are used to ensure high availability and integrity of systems and information. This article examines the...

Network security is one of the cornerstones of any enterprise’s online operations. A firewall, or firewall, is one of the primary tools used to protect IT infrastructure. We’ll discuss the...

There was a time when clumsily worded emails from cybercriminals were as easy to detect as a cactus in the middle of the desert. Scammers impersonating Nigerian princes were generally...

You turn on a site in your Chrome browser and see an “Unsecured” message next to the box that contains the address? Then you check it in Firefox and this...

Did you know that people who don’t use a password manager are three times more likely to have their identities stolen than those who use one properly? According to data...

Nowadays, more and more people are using cloud computing to store and manage their data. However, with the growing popularity of these services, questions arise about the security of data...

Popular password management company LastPass has come under pressure after being hacked in August 2022. Details of how the hackers first breached security are scarce, and the first official comment...