Jun 8, 2023
Main types of scams focused on social engineering
Threats related to social engineering are nothing new. Learn about the main methods of social engineering used.
Dec 16, 2022
How to run phishing simulations to increase your organization's security
Learn how phishing simulations can help people in your organization recognize cyberthreats. That way, you keep your organization safe.
Feb 25, 2022
Passwordless World: How to reimagine the authentication
Passwords have been the most popular authentication security layer for decades. But can you imagine a passwordless world?
Oct 29, 2021
Acceptable use of computing resources: policies that ensure more security
Defining acceptable use policies for computing resources is critical to your organization's security.
Oct 26, 2021
Black Friday: how to shop online more safely
With promotional dates approaching, such as Black Friday, which takes place in November, many stores also offer great discounts. But it's...
Oct 7, 2021
Customer success: our journey searching for strategic results
In today's world, cybersecurity has become a strategic element for organizations. With this, it is natural for large institutions and...
Sep 30, 2021
How you can improve your security and privacy on LinkedIn
LinkedIn is a tool where we seek professional connections. For this reason, it is very common that data, such as email and phone, can be...
Sep 30, 2021
Cyberattacks: what are the harms for organizations and how can they deal with it
Digital security has become one of the key points for organizations in recent years. The growing number of cyberattacks around the world...