Once data began going digital, authorities realized a need to protect it. Thus, the creation of data privacy rules and regulations to address cyber threats. Many organizations have
Before the holidays I was a guest on Martin Hurych's podcast Zážeh. Martin called it "IT security for the layman". The full transcript of the interview, including the
For the most lazy existences that don't want to do almost anything 5 tips to ensure your safe survival on the internet (not just during the holidays) I
"Soul engineering in practice"It's a carbon copy. Over and over again. First the solution and next time we'll have the whole story for those who like to read.
Topic: Safe EmailIt is extremely important to protect your email account. Why? If you haven't turned on multi-factor authentication (MFA), an attacker can access other online accounts or
Your cell phone and security?Set a PIN lock, ideally more than 4 characters, i.e. 6 characters. You can substitute a fingerprint, some prefer FACE ID (every man's opinion
Authentication (User Identity Verification) & Passwords And here we have the continuation of the checklist. A few of you have gotten back to me with more tips, thanks!
Topic - Safe web browsing: We have prepared a "series to continue". We will focus on one topic each time. No theory, just tips, tricks & tutorials and
Mám pro Vás krátký a rychlý tip na Vulnerability scanner ZADARMO (program na detekci zranitelností ve vaší síti). Jestli nic nepoužíváte, tak ho určitě doporučte Vašemu IT –
At first glance, it seems like a great idea. How about bending SharePoint to store backups? It's doable, but it's hard work. It's like riding in a limo