The Blog

Catch up with the latest news on technology and cyber security, right here.

Are you aware of what is going on in your city online?

Human traffickers target your city for customers to trade their human goods The Darknet and online Forums contains content that reveals illegal activities related to your city. Are you aware of these online crime signals? We are continuously monitoring...
Read More

5 TIPS TO ACHIEVE MINIMUM SECURITY FOR FTP

FTP, or File Transfer Protocol, was invented back in 1971 and long before ‘the internet’. It’s a standard network protocol that is built on a client-server architecture model that was developed for the transfer of files between a client and a server...
Read More

Two-factor Authentication for Schools and Universities

Two-factor Authentications are a vital function for Teachers and Students of any School or University today. Any organisation remains vulnerable to potential fraud and account take-over without Two-factor Authentication. Armed with the latest fraud technology...
Read More

FIGHT FRAUDULENT DIGITAL ACCOUNT OPENINGS WITH INEXCHANGE®

Digital account openings are a vital function to the lifeblood of any transaction-based company. But even the most security-conscious organizations remain vulnerable to potential fraud and financial loss. Armed with even a few key pieces of compromised...
Read More

FIGHTING TOOLS WITH ITS GLOBAL DIGITAL INTELLIGENCE NETWORK, INEXCHANGE®

Ciptor is working very close with InAuth, a leading digital device authentication company, today announced it has enhanced its InExchange® solution, a global digital intelligence network, to provide businesses with advanced insights to help them make...
Read More

How You Can Create a Strong Corporate Cybersecurity Vision

How You As a Leader can Create a Strong Corporate Cybersecurity Vision It’s important to have a strong vision and a comprehensive plan. To reach the right level of cybersecurity, leadership  is crucial to be able to bring the idea that this is the...
Read More

iOS and Android devices under attack

New malware found, that are attacking both Android and iOS devices. It time for bank costumer’s to demand that their bank invest in new cyber security tools that will prevent today’s cybercrime. Widespread routers’ DNS hijacking malware...
Read More

Security Key for Windows Hello

  Our Trusted Partner Feitian has worked closely with Microsoft to provide a ubiquitous, hardware-backed logon experience through Windows Hello. For enterprises who use passwords today and have a shared PC environment, security keys for Windows Hello...
Read More

CREDENTIAL STUFFING DEFENSE

Credential compromise is a cyclical issue. It begins of course with the theft of credentials such as user IDs, email addresses and passwords. Then the credentials are often released, a process known as spilling, onto the dark web. Finally, the credentials...
Read More

Know Your Customer (KYC)

Prevent criminal and fraudulent customers from entering your client base and stay compliant with Anti-Money Laundering (AML) and Know Your Customer (KYC) requirements. By using top-tier forensic technology in your Due Diligence process you are activating...
Read More