According to the Niebezpiecznik.pl portal, ransomware gangs steal huge amounts of data monthly – over 10 terabytes. To better illustrate this – 10 TB is 10,000 hours of Full HD video (each hour is about 1GB) or 2,500 hours of 4K video. It’s imaginative, isn’t it? We know from the KPMG report “Cybersecurity Barometer 2022” […]
Why is it important to take a comprehensive approach to secure Internet interfaces, instead of focusing on one area, e.g. a firewall? In this article, we will take a shot at answering this question, showing potential Internet interfaces that can be critical in case of attack. You will learn what firewall network security is and […]
A cyber security audit is often the first step to ensuring the security of your business, especially when most employees work remotely. An audit is the starting point for building a continuous safety improvement process in the company. The process starts with non-invasive testing of specific resources in the infrastructure and checking these against given […]
No matter the attack is original Petya worm or it’s modified version (already called NotPetya), the fact is that it hits biggest brands starting at Ukraine government, Chernobyl power station continuing with Raben, Maersk or St Gobain. So yes, it is disruptive. What we know so far and how we can try to prevent if […]