59 posts
How to use a USB without the risk of data leaks
IBM has banned its staff from using all removable storage devices, such as USB sticks. However, you don’t need to go as far as this in order to keep your company’s data safe.
Tech support scams are still going strong
Online scams have become a lot more sophisticated. The methods used to con people are more complex, and the trick lies in getting users themselves to do the dirty work. It’s called social engineering.
Panda Adaptive Defense, security certified by Common Criteria
The advanced cybersecurity solution Panda Adaptive Defense is the only EDR protection to achieve the EAL2+ certification in its evaluation for the Common Criteria standard.
Panda Data Control, the security module adapted to GDPR
-Panda Security presents Panda Data Control, the data security module adapted to the new General Data Protection Regulation which has been in force since May…
The danger of unstructured data
The countdown is drawing to an end. May 25 looms on the horizon and adapting to the GDPR has gone from being a task that needs to be addressed in the future to an imminent obligation.
Memcached, the latest DDoS attack
Memcached has become cybercriminals weapon of choice to carry out DDoS attacks.To prevent it is crucial to have a detection and mitigation plan.
What happens if I violate GDPR?
Less than 65 days. That is how long is left until GDPR comes into force. Is your company prepared?