Security
Global Software Outage caused by failed update
In an unprecedented event, we are witnessing what may be the largest global software-induced outage in recent history.
All the news to keep your data secure and safe.
Security
In an unprecedented event, we are witnessing what may be the largest global software-induced outage in recent history.
Security
Everyone gets bothered by spam e-mails landing in their inboxes all the time. These unsolicited messages have been a constant part of our e-mail correspondence since the mid-nineties. But what actually is spam and why is it sent? Most importantly, how can you get rid of undesired spam e-mails or
Security
Data loss prevention (DLP) makes sure that users do not send sensitive or critical information outside the corporate network.
Security
The difference between HTTP and HTTPS can be successful or suffering.
Security
Our Top 5 Tips to keep you and your clients secure from hackers.
Collaboration
Learn how to implement DMARC records for secure email communication in Part 3 of our series.
Collaboration
Learn how to implement DKIM records for secure email communication in Part 2 of our series.
Collaboration
One common solution is the Sender Policy Framework (SPF), which allows mail servers to verify the authenticity of sender addresses. You can do this yourself by checking the SPF record. How exactly do you do that?
Security
An IT disaster recovery plan offers a blueprint for crucial situations by laying out different approaches to solving problems and appropriately delegating accountability.
Business
While there is no way to guarantee that your accounts won’t be hacked, one of the best lines of defense is to create stronger passwords.
Business
In this article we provide guidelines on specific steps you can take to move your site toward GDPR compliance.
Security
So lets have a look what is Lets Encrypt and how it works. Let's start with how things are with "normal" SSL certificates.