Uncategorized

How you can secure and protect your inside business!

Today when you are inside the corporate network, you can use mass storage devices, such as USB memory stick, mobile phones, tablets, portable hard drives etc. to steal data from the organisation or bring unwanted data into the company example Ransomware....
Read More

Multi-factor Authentication

Today you can easily secure your Dropbox, GitHub, Office365 or Google account with a Multi-factor Authentication. Authenticating users with a Multi-factor Authentication – as opposed to potentially weak passwords – is a much stronger method of keeping...
Read More

Two Factor Authentication Using Yubikey Yubicloud And Big Ip Ltm

How it YubiKey works By touching the integrated button, the YubiKey sends a time-variant, secure login code as if it was typed in from a keyboard. The unique passcode is verified by a YubiKey compliant web service or software application, in our case...
Read More

CIPTOR BENELUX GDPR kit

GDPR is het buzzwoord van infosecurity. We mochten een 300 tal geïnteresseerden inwijden in onze tools die JOU bedrijf GDPR veilig maken (of GDPR compliant voor the nerds). De richtlijn die vanaf 04/2018 in voegen gaat houdt in dat je geen gegevens of...
Read More

Ciptor Benelux – YubiKey & U2F Protect Facebook Accounts

vandaag een grote dag voor de sociale facebooker. Facebook integreerde FIDO U2F voor zijn 1.8 miljard gebruikers. In tijden dat het vertrouwen in internet en het verliezen van gegevens aan kwaadwillige mensen ons dagelijks deel zijn is dit zeker de beste...
Read More

NEW CIPTOR SOLUTION COMBINES SECURE ONLINE PAYMENT WITH AUTHENTICATION BY A SELFIE!

Mastercard recently announced that they now are entering the Biometric market and that they will let you make online purchase with your face. Ciptor is taking this to the next level by introducing a real Selfie authentication with the technology from...
Read More

4 Ways to Combat Hacking

Smart companies find creative ways to secure their customer and employees data and to keep hackers from walking inside their accounts and devices. Corporate executives might know about their revenue and performance metrics inside-out, but they don’t...
Read More