Contact

Cyber Security

Blogs

Although Social Media is seen by most people as a safe and trustworthy environment, there are still many dangers. Identity fraud is one of the dangers that is becoming more prevalent through Social Media. Read more

When you become a victim of Ransomware, it is important to act correctly. In this blog we will give you some tips on what to do in this stressful situation. Read moreĀ 

In addition to identifying a fraudulent e-mail through certain characteristics, discussing the company culture and continuously improving the established business processes is also very important in the fight against CEO Fraud. Read more

This website uses cookies

We find it very important that you are aware of which cookies our website uses and for which purposes. We use Functional Cookies to make our website function properly. In addition, we use Analytics Cookies to analyze the use of our website. We also ask your permission for the placement of cookies from third parties (social media, advertising and analytics partners) with whom we share information. By clicking 'Accept', you accept the placement of the above mentioned cookies. If you click on 'Settings', you will be taken to a page where you can specify which cookies may and may not be placed. Click here for our Privacy Statement.