How to know if remote access is secure at your company

Employers have transferred employees to remote work to protect them from the coronavirus. But not all companies have taken care of their own protection, although remote access – VPN, DaaS, RDP, etc. – is a type of connection that requires a change in the monitoring focus and special measures to protect against cyber attacks. These … Read moreHow to know if remote access is secure at your company

Top 5 main CyberSecurity risks in 2020

The past year in terms of cybersecurity was remembered for APT attacks on organizations in the financial sector, high-profile data leaks, and the search for hardware vulnerabilities by cybercriminals. While the management of the companies was looking for an adequate response to the threats, cybercriminals are entering the warpath with new means and schemes. A … Read moreTop 5 main CyberSecurity risks in 2020

5 ways smartphones track disease and health

Since the introduction of the first iPhone in 2007, smartphones have been used everywhere. One area where devices have new perspectives is in medical diagnostics. Gadgets may soon change how we detect diabetes, measure female fertility, or detect cancer. The computing power of modern smartphones, together with high-quality cameras and a set of constantly updated … Read more5 ways smartphones track disease and health

5 cases when you can’t do without a virtual server

Virtual Server (VPS) is a hybrid of a physical dedicated server and virtual hosting. It differs from the first VPS in that the client receives not physical, but virtual computing resources (CPU, RAM, HDD / SSD). From the second – the fact that these resources are allocated and assigned strictly to one client, and not … Read more5 cases when you can’t do without a virtual server