Editorial Team

Editorial Team


Thoughtful pieces written by guest authors, including security experts and industry thought leaders.


144 articles by Editorial Team

Featured

How to limit damage when a device is lost or stolen

How to limit damage when a device is lost or stolen

Featured

How to limit damage when a device is lost or stolen

No matter how vigilant people are, accidents happen, and devices can go missing. Are you prepared to limit the potential damage to your business, should a device fall into the wrong hands?

Editorial Team04 Jan 20243 min. read


Featured

Virtual meeting room: Is your videoconferencing safe from unauthorized access?

Virtual meeting room: Is your videoconferencing safe from unauthorized access?

Featured

Virtual meeting room: Is your videoconferencing safe from unauthorized access?

Video conferencing has many benefits, but not unlike physical interaction, it can also harbor many dangers that can expose businesses to data risks.

Editorial Team06 Dec 20233 min. read


Featured

Phishing 2.0: Get to know pretexting and business email compromise

Phishing 2.0: Get to know pretexting and business email compromise

Featured

Phishing 2.0: Get to know pretexting and business email compromise

As an IT manager, you play a key role in protecting your organization from social engineering threats. The challenge is not only to protect the company's systems and data, but also to ensure that your employees remain vigilant against these tactics.

Editorial Team20 Nov 20235 min. read


Featured

Fake demands for payments: from victim to victor

Fake demands for payments: from victim to victor

Featured

Fake demands for payments: from victim to victor

If you fall victim to a social engineering attack, having the right response plan in place can significantly reduce its negative impacts. Read about real-life examples and gain insight into post-attack recovery strategies.

Editorial Team15 Nov 20235 min. read


Featured

“Who’s calling?”: Elevating vishing awareness with a simulation

“Who’s calling?”: Elevating vishing awareness with a simulation

Featured

“Who’s calling?”: Elevating vishing awareness with a simulation

Conventional cybersecurity seminars and mass-distributed educational emails often fail to communicate to the employees effectively. Consider simulation-based training to elevate the training experience to a more engaging level.

Editorial Team25 Oct 20234 min. read


Featured

Vishing, smishing, and phishing. How to arm yourself against social engineering attacks

Vishing, smishing, and phishing. How to arm yourself against social engineering attacks

Featured

Vishing, smishing, and phishing. How to arm yourself against social engineering attacks

Social engineering attacks remain a top concern. For IT departments, it is crucial to be aware of different types of challenges, and to help employees understand and prevent any risks.

Editorial Team06 Oct 20232 min. read


Featured

Vulnerability Management: An essential component of your security strategy

Vulnerability Management: An essential component of your security strategy

Featured

Vulnerability Management: An essential component of your security strategy

While many organizations focus on preventive measures like firewalls and antivirus software, they often overlook a critical aspect — vulnerability assessment and patch management.

Editorial Team08 Aug 20233 min. read


Featured

PaaS vs. SaaS: Which option suits your business?

PaaS vs. SaaS: Which option suits your business?

Featured

PaaS vs. SaaS: Which option suits your business?

As a business owner, you may have heard of PaaS and SaaS as the two most popular cloud solutions. While both offer a variety of benefits, they are not created equally. Understanding the differences between PaaS and SaaS can help you decide which solution is best for your business.

Editorial Team19 Jul 20233 min. read


Featured

Phishing debunked: What should you know about this threat in 2023?

Phishing debunked: What should you know about this threat in 2023?

Featured

Phishing debunked: What should you know about this threat in 2023?

Here’s what you should know about recent developments in phishing.

Editorial Team28 Jun 20233 min. read