Menu

US Region

Grandmetric LLC
Lewes DE 19958
16192 Coastal Hwy USA
EIN: 98-1615498
+1 302 691 94 10
info@grandmetric.com

EMEA Region

GRANDMETRIC Sp. z o.o.
ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43
info@grandmetric.com

UK

Grandmetric LTD
Office 584b
182-184 High Street North
London
E6 2JA
+44 20 3321 5276
info@grandmetric.com

  • en
  • pl
  • The 5 most dangerous ransomware attacks in Poland. Is your company really safe?

    Network Security

    The 5 most dangerous ransomware attacks in Poland. Is your company really safe?

    According to the Niebezpiecznik.pl portal, ransomware gangs steal huge amounts of data monthly – over 10 terabytes. To better illustrate this – 10 TB is 10,000 hours of Full HD video (each hour is about 1GB) or 2,500 hours of 4K video. It’s imaginative, isn’t it? We know from the KPMG report “Cybersecurity Barometer 2022” […]

    Date: 04.04.2023

    Category:

    Phishing – a big problem for small and medium-sized businesses 

    Phishing is one of the most serious threats facing business owners today. Over the past few years, phishing attacks have become increasingly sophisticated and difficult to detect. Meanwhile, the study “Perception of Cybersecurity among Managers of Polish Companies” was commissioned in 2022 by Sophos*. It showed that more than a quarter of Polish companies do […]

    Date: 04.04.2023

    Category:

    Companies on hackers’ radar. Where to start cybersecurity? 

    Cybersecurity is often associated with large companies and serious financial outlays. This is wrong thinking with very serious business consequences.  According to F5 in its Phishing and Fraud Report, with the outbreak of the pandemic and the move of employees to the home office, the number of phishing or ransomware attacks not only increased by […]

    Date: 03.04.2023

    Category:

    6 Ways to Secure Your Network & Users with Cisco Security

    Investments in cyber-security are gaining importance more than ever before, and taking care of network security, access, users and data is no longer just a matter of responding to ad hoc threats when they appear. A new reality, where many processes happen virtually or in a cloud environment, requires proactive steps towards achieving effective protection […]

    Date: 23.02.2023

    Three Models of Cisco Umbrella Deployment

    There is no need to convince anyone of the fact that phishing is one of the most widespread methods of attacks on enterprises. The Data Breach Investigation Report 2022 from Verizon shows that phishing is the second greatest (after login credential theft) threat for companies.  It’s worth asking yourself, is there a mechanism that preempts […]

    Date: 07.02.2023

    Author: Marcin Bialy
    Category:

    Cisco Duo MFA Solution in Practice

    According to Verizon in their 2022 report, over 82% of security incidents were related to human-side negligence, such as password leaks or phishing. Moreover, passwords being stolen have various lengths and degrees of complexity. Considering the scale and improvements in methods used by malicious actors, it’s not that difficult to see even a strong password […]

    Date: 20.09.2022

    Author: Marcin Bialy
    Category:

    Security of wireless networks – how do hackers get in? 

    When dealing with networks, both wired and wireless, we can’t fail to mention the security issue. In the case of wireless networks, many users are unaware of the hazards lurking when switching between networks and using unprotected, unverified wireless networks. This article will answer your questions on securing the Wi-Fi network and making it resistant […]

    Date: 08.08.2022

    Author: Marcin Bialy

    LAN security and how it is hacked

    To check whether a given IT infrastructure is resilient, and its LAN security strong, first, we need to run audits and penetration tests. While performing these, we use various protection breaching techniques to access the company’s resources. One of the basic tests is an attempt to obtain as much information as possible at a local […]

    Date: 01.08.2022

    Author: Marcin Bialy

    Pentesting, or how to take care of cyber security

    Spectacular bank robberies with a gun in hand and a stocking on the face are history. Modern criminals moving into cyberspace use much more sophisticated ways to make a profit. If we do not focus on regular pentests and do not take care of the proper security of the website or network edge, we can […]

    Date: 31.03.2022

    Category:

    Cyber Security Audit: Why Your IT Department Should Not Fear It 

    A cyber security audit is often the first step to ensuring the security of your business, especially when most employees work remotely. An audit is the starting point for building a continuous safety improvement process in the company. The process starts with non-invasive testing of specific resources in the infrastructure and checking these against given […]

    Date: 30.03.2022

    Load more
    Show all
    Grandmetric