[gtranslate]
Computer with "under construction" message on the screen to counter CDR

CDR (Content Disarm & Reconstruction): what it is and how it works

CDR (Content Disarm & Reconstruction): what it is and how it works Do you know what is one of the biggest dangers to your company’s information security today? If you

Publicação
Girl showing bra in a photo used in sextortion scam

New type of sextortion scam: watch out

New type of sextortion scam: watch out Imagine that you receive an email saying that your device’s camera has been hacked and you need to pay a ransom so that

Publicação
Mail server behind the shield of data protection

9 tips to protect your business’s mail server

9 tips to protect your business’s mail server One of the servers that work the most in your data center is the mail server, probably. The traffic passing through it

Publicação
Sandbox in the middle of a lobby receiving malicious email

What is sandbox?

What is sandbox? In information security, sandbox is a solution used to test, run, and block potentially malicious programs and code before they affect an application, system, or network. That’s

Publicação
Developers reading messages in a blurry behind Gmail logo

Third-party developers may be reading your Gmail messages

Third-part developers may be reading your Gmail messages A report by the Wall Street Journal brought to light this week a concerning privacy and email security issue: third-party developers may read Gmail user’s

Publicação
Professionals recognize phishing hook pulling data from malicious emails

7 tips on how to identify and detect malicious emails

7 tips on how to identify and detect malicious emails Email is an important communication tool, especially for companies. But on the other hand, email is also the main vector

Publicação
Business sending money to create a cybersecurity budget

How much should I spend on cybersecurity to protect my business?

How much should I spend on cybersecurity to protect my business? We know that not many companies have a large budget to spend on IT and, more precisely, on cybersecurity.

Publicação
Magnifier showing common email threats

6 most common email threats explained

6 most common email threats explained There is an old proverb that says something like “it’s not enough to go to the river with the intention of fishing; you must

Publicação
Skull code blocking man to see the report fbi at screen

Losses due to Business Email Compromise (BEC) grew by almost 90% in 2017, says FBI

Losses due to Business Email Compromise (BEC) grew by almost 90% in 2017, says FBI The 2017 Internet Crime Report, released by the FBI (see the link below), indicates that

Publicação
Business man invest in email security around the world

5 reasons why your business should invest in email security

5 reasons why your business should invest in email security Email has become such an integral part of our routine that most times we use it mindlessly. We close deals

Publicação