Events such as this one should also serve as a reminder for organizations not only to take their own security serious, but also to take a close look at the security of organizations they work with
Have questions? Get in touch with us!
Mailboxes are sometimes full of pishing email sent to users with the purpose of getting personal information. Among the different emails registered by the SecurityLab of G-DATA, there are some they are worth sharing.
There are no studies which prove the mathematical correlation between well-being and productivity, but happiness in the workplace is responsible of more than 50% of the cases of absenteeism. An analysis of Sylvie Blonde, HR Manager of Stormshield.
In the wake of the French and U.S. elections, each having had their fair share of confirmed and suspected hacks and data leaks, it is only natural to wonder whether the fate of democracy is today more in the hands of the hackers than the people. Stormshield’s opinion about [...]
G DATA Italia confirms: the level of disinformation of young people is still worrying in the face of the risks to which they are exposed at a too early age.
Technology as the only way to prevent cyber attacks is not more enough: the human factor is very important and it has to be considered within IT security policies in a company. Through targeted actions of staff training, a status of awareness should be reached, putting the collaborator as [...]
Soit-il à la maison ou en vacances, en été on désire plus de liberté, sérénité et on veut profiter de la paix. Rien de plus facile : les produits FRITZ! s’occupent de tout ! Les utilisateurs les plus exigeants peuvent même porter leur propre réseau domestique directement en vacances.
Big sport events such as the World Cup are particularly interesting for hackers when it comes to broadcasts’ piracy, access to confidential data, discrediting of the host nation through targeted attacks. Channel broadcasts, betting platforms and selling of online tickets are targets easy to hit: an analysis of Stormshield. [...]
Infiltration procedures in everybody’s privacy are justified with worries about national security: who benefits from these regulations?