ciptor

ciptor

Prepare your application for GDPR with Triggerfish

Much is being spoken about the General Data Protection Regulation, GDPR, which from 25th of may will regulate the handling of personal information in Sweden. It replaces Personuppgiftslagen (PuL) and will require extensive changes to organisations and...
Read More

Cyber Security Trends 2018

What are the biggest cyber security trends to look out for in 2018? We’ve put our top cyber security researcher on the case to identify top shifts in technology for 2018. ”When big changes happen it is often because regulation, user preference and...
Read More

Identify Security Vulnerabilities

Companies today are exposed to daily attack attempts where attackers use automated tools to detect vulnerabilities. These tools allow an attacker to gain access to confidential customer information. The automatic tools these attackers use are becoming...
Read More

MALWARE AND MOBILE THREAT UPDATE

ANDROID BANKING TROJAN CAN BLOCK CALLS, BANKBOT TROJAN DISGUISED AS GAME, MALWARE STEALS BANKING CREDENTIALS, SEO-OPTIMZED MALWARE LINKS, IPHONE X JAIL BREAKIMMINENT, OLD BANKING TROJAN MAKES A COMEBACK Welcome to the latest update where we compile recent...
Read More

Google’s strongest security for those who need it most

The Advanced Protection Program safeguards the personal Google Accounts of those most at risk of targeted attacks—like journalists, activists, business leaders, and political campaign teams. Protecting you from targeted online attacks. 01.Get the strongest...
Read More

How to secure your accounts with Google’s Advanced Protection Program

Google released something unusual last month called Advanced Protection Program. The basic idea of this program is pretty simple, using physical security keys to act as second step verification of your G-mail account. And obviously, all of the Google...
Read More

FIDO Alliance will help develop best practices for proper authentication

Two things are true in our modern era: 1. The digital economy has changed pretty much everything 2. We have to remember a lot of passwords Unfortunately, the deluge of individual passwords to remember is pushing the human brain’s memory capacities to...
Read More

How you can secure and protect your inside business!

Today when you are inside the corporate network, you can use mass storage devices, such as USB memory stick, mobile phones, tablets, portable hard drives etc. to steal data from the organisation or bring unwanted data into the company example Ransomware....
Read More

Multi-factor Authentication

Today you can easily secure your Dropbox, GitHub, Office365 or Google account with a Multi-factor Authentication. Authenticating users with a Multi-factor Authentication – as opposed to potentially weak passwords – is a much stronger method of keeping...
Read More

Two Factor Authentication Using Yubikey Yubicloud And Big Ip Ltm

How it YubiKey works By touching the integrated button, the YubiKey sends a time-variant, secure login code as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey compliant web service or software application, in our case...
Read More