"Soul engineering in practice"It's a carbon copy. Over and over again. First the solution and next time we'll have the whole story for those who like to read.
Topic: Safe EmailIt is extremely important to protect your email account. Why? If you haven't turned on multi-factor authentication (MFA), an attacker can access other online accounts or
Your cell phone and security?Set a PIN lock, ideally more than 4 characters, i.e. 6 characters. You can substitute a fingerprint, some prefer FACE ID (every man's opinion
Authentication (User Identity Verification) & Passwords And here we have the continuation of the checklist. A few of you have gotten back to me with more tips, thanks!
Topic - Safe web browsing: We have prepared a "series to continue". We will focus on one topic each time. No theory, just tips, tricks & tutorials and
A backup that can't be deleted (changed) is your last resort against attackers and also against your own IT people or an attack from inside your organization.What is
No, I'm not going to convince you or scare you.Today I have prepared for you the possibilities where to go with them - with PASSWORDS. Keep in mind
The road to an imaginary hell often starts here. With us. Owners, directors, C-levels. This type of targeted attack (on leadership positions) is extremely effective. Access to a
That's right! I'm not a wizard, but I have the cure. A group of IT experts are probably crucifying me for simplifying this. But it usually works in
Today, the topic of Shared Responsibility is on the table. Let's take a look at it. For the sake of simplicity, we'll count on the Office365/Microsoft365 SaS (Software