Contact

Cyber Security

Blogs

Whereas traditional malware is often detected by analysing executable programme files (executable binaries), Fileless Malware works differently. In this article, colleague Nick Joghems explains what Fileless Malware is and how it works. Read more

Recent years have seen an increase in the use of spyware. Read in this article written by colleague Michelle Rasch what spy apps are, how they are used and how you can deal with them. Read more

Cybercrime or hacking is often possible through an open port on a computer or server. But what is actually meant by this? And how can you avoid being hacked? In this blog, Sjoerd van der Meulen explains. Read more

Although Social Media is seen by most people as a safe and trustworthy environment, there are still many dangers. Identity fraud is one of the dangers that is becoming more prevalent through Social Media. Read more

When you become a victim of Ransomware, it is important to act correctly. In this blog we will give you some tips on what to do in this stressful situation. Read more 

In addition to identifying a fraudulent e-mail through certain characteristics, discussing the company culture and continuously improving the established business processes is also very important in the fight against CEO Fraud. Read more

This website uses cookies

We find it very important that you are aware of which cookies our website uses and for which purposes. We use Functional Cookies to make our website function properly. In addition, we use Analytics Cookies to analyze the use of our website. We also ask your permission for the placement of cookies from third parties (social media, advertising and analytics partners) with whom we share information. By clicking 'Accept', you accept the placement of the above mentioned cookies. If you click on 'Settings', you will be taken to a page where you can specify which cookies may and may not be placed. Click here for our Privacy Statement.