The Cybersecurity Blog

Our blog is the information source of the latest news, opinion, advice, research & insights into cyber security and IT Security for business.

FB-post
Alarming cyber security blind spot

Few things have had such a radical influence on office culture in recent years as the sudden shift during the pandemic to remote work for just about every company. But this can cause an alarming cyber security blind spot. Instead […]

Read more
Read More
North Korean hackers use fake company to trick researchers

North Korean hackers use a fake security company and social media accounts as part of a widespread campaign to trick cybersecurity researchers with malware.Hackers have leveraged at least two fake accounts on LinkedIn that impersonate recruiters appearing to be from […]

Read more
Read More
Facebook-post
3 cyber security lessons learned from the pandemic

Protecting a company with only remotely working employees and their devices at this scale and speed has never been done before. Now, we do it every day. Learn from the 3 cyber security lessons we learned from the pandemic.Cybersecurity professionals […]

Read more
Read More
acer-logo
Acer facing ransomware demand

What happened? Acer is facing a ransomware demand, they are reportedly the latest technology giant to have fallen victim to a blackmail attack. The Taiwanese company has been attacked by a gang using the extortion virus REvil demanding the transfer […]

Read more
Read More
Microsoft Exchange Server hacked
Microsoft Exchange Server hacked

In early January the Microsoft Exchange Server was hacked. The Microsoft Exchange Server hosts email and calendar services. The initial hackers were Chinese cyber spies, but after that other intruders also got in, using the initial breach as their way […]

Read more
Read More
Facebook-post
Biggest trends – and threats – in cyber security

As we’ve written before, 2020 was clearly the year where cyber criminality skyrocketed. So of course this has consequences for cyber security in 2021. Learn about the biggest trends and threats in cyber security that we have observed. Threats Using […]

Read more
Read More
Farmers have to hack their own tractors to keep them running
Farmers have to hack their own tractors to keep them running

Yes, you’ve read that right. Farmers are required to hack their own equipment, just to keep it running. Companies, such as John Deere, aren’t willing to license out the software necessary to diagnose and fix their farm equipment. This forces […]

Read more
Read More
Facebook-Post-Charlottes
Friend or foe: three examples of fraud on WhatsApp

Case 1: the family affair You are contacted by someone that claims to be your son or daughter, or a very close relative that you care about. This relative is in desperate need of money to pay some bills, or […]

Read more
Read More
One out of five Belgian websites vulnerable to hacking

Hackers can easily penetrate nearly one in five corporate or government Belgian websites. Government websites are at the greatest risk of hacking.Criminals can illegally modify the website at one in four sites of municipalities and local police departments, possibly gaining […]

Read more
Read More

Find out how we can protect your business

In our demo call we’ll show you how our technology works and how it can help you secure your data from cyber threats.

Cybersecurity
Are you an integrator or distributor?

Need an affordable cybersecurity solution for your customers?

We’d love to help you get your customers on board.

checkmark

White glove onboarding

checkmark

Team trainings

checkmark

Dedicated customer service rep

checkmark

Invoices for each client

checkmark

Security and Privacy guaranteed