top of page


You have been attacked? Cyberattack: The first steps in an emergency
How does a company manage to react quickly when it becomes the victim of an attack? In order not to be caught cold if the worst comes to...
Erol Aydin
5 min read
0


Cybersecurity with hashing
Hashing is a cryptographic process that can be used to verify the authenticity and integrity of various data types....
Erol Aydin
4 min read
0


SMEs crippled by cyber attack
As the mid-2021 Acronis Cyberthreats Report shows, we saw many new developments like the one in Anhalt-Bitterfeld in the first half of...
Erol Aydin
3 min read
0


The zero trust environment - How network security works
Until now, the "castle and moat" approach, also known as perimeter security, was considered the most effective method against cyber threats.
Erol Aydin
4 min read
0


DDos Attack - The Underestimated danger
DDoS attacks quickly cause enormous financial damage, not to mention possible image damage. But the threat...
-
4 min read
0
bottom of page