The Cybersecurity Blog

Our blog is the information source of the latest news, opinion, advice, research & insights into cyber security and IT Security for business.

red-cross-jimber
Cyberattack Red Cross: An interview with cyber experts

The International Red Cross is under attack. They have been the victim of a mass cyberattack. The sensitive data of at least 515.000 vulnerable are at risk. Some of these people were fleeing conflicts or looking for family members they […]

Read more
Read More
encryption-key-data-encryption
What is data encryption?

Data encryption is there to protect sensitive and private data. Data encryption improves the security between apps and servers. Unauthorized people will not be able to read your data when you use encryption technology. Data is vulnerable because of the […]

Read more
Read More
OWASP-top-10
The OWASP top ten 2021

What is OWASP? OWASP (Open Web Application Security Project) is a non-profit organisation focused on improving website security. They provide open-source software development programs, project, toolkits, local chapters, conferences, articles, videos, forums, methodologies, documentation and technologies to their community.They provide […]

Read more
Read More
Jimber-Digital-Vault
How to securely send files

Professionals are always on the lookout for the most secure way to send documents online. As you might know, secure file transfer is not that easy to do. If it really were, we wouldn’t be talking about it so often. […]

Read more
Read More
ethical-hacking-interview-jimber-employee
Ethical hacking: interview with a Jimber employee

What is ethical hacking? Ethical hacking is a legitimate practice of hacking into a system to find possible data threats and breaches in a network, application or data. Cyber security professionals do this with consent of the company to try […]

Read more
Read More
what-is-browser-isolation-jimber
What is browser isolation?

Browser Isolation or Web Isolation is the technology that contains web browsing activity within an isolated environment. This environment is separate from the user’s normal working environment. This protects the user from malware because the malware does not actually enter […]

Read more
Read More
Russia’s cyber security strategy

As you’ve probably heard before, Russia receives a lot of allegations of cyber attacks. This has led to sanctions and even expulsion of Russian diplomats.In this article we give you a look into the world of Russian cyber crimes. Expertise […]

Read more
Read More
Security in a growing company

Cybersecurity is a very important pillar of your organization. It goes without saying that this also applies to Jimber. Security has many facets. A breach in any of these can have a major impact on the operations of your business. […]

Read more
Read More
young-boy-computer
Cyber security in the Australian school curriculum

The Australian government proposes cyber security education for kids aged five to sixteen to help them handle this increasingly online world. The five-year-olds will be taught not to share personal information, like their date of birth or full name. After […]

Read more
Read More

Find out how we can protect your business

In our demo call we’ll show you how our technology works and how it can help you secure your data from cyber threats.

Cybersecurity
Are you an integrator or distributor?

Need an affordable cybersecurity solution for your customers?

We’d love to help you get your customers on board.

checkmark

White glove onboarding

checkmark

Team trainings

checkmark

Dedicated customer service rep

checkmark

Invoices for each client

checkmark

Security and Privacy guaranteed