News
-
Why is cyber security training essential for organisations?
2024 03 274 min readDiscover a step-by-step guide to cyber security training. Plan and prevent your organisation from cyber threats.
More -
What is penetration testing?
2024 03 215 min readLearn more about penetration testing and its importance in enhancing cyber security measures in our blog post.
More -
Rising cyber threats: a close look at global and Baltic cyber security situation
2023 10 237 min readDive into Baltic and global cybersecurity, uncovering causes of cyberattacks and key threats for organisations.
More -
Top 6 tips on setting a robust password
2023 07 203 min readGet six helpful tips and tricks for establishing a robust password.
More -
Cyber security threats: how to protect our data from invisible enemies?
2023 05 292 min readAlong with the rapid digital technology development, the risk of facing cyber challenges for companies increases. Cyber hackers also took unique advantage of a pandemic situation: not all businesses had the chance to upgrade security systems during quarantine. People started using their work computers for personal needs, naturally forgetting computer security essentials.
More -
Ultimate security guide for digital nomads
2022 08 183 min readLet's deep dive into the digital nomad's concept and core information security recommendations that everyone needs to consider before jumping into another "working from anywhere" adventure.
More -
How to protect your business from cyber attacks?
2022 07 143 min readRead more to learn how to protect your business and what to do if you fail to protect yourself from a cyber attack.
More -
What is automotive (car) hacking?
2022 05 033 min readIn this blog, we discuss what is automotive (car) hacking, what methods can be used to perform such attacks and how to protect from them.
More -
Can one supply chain cyber-attack stop the world?
2022 04 263 min readThis blog post will present what is supply chain attack, how to prevent and manage the risk of experiencing a supply chain attack.
More -
Cyber criminals aftermath: 9 tips for companies affected by a cyber attack
2022 02 032 min readIt is silly to think that cyber criminals attack the same victim only once. Having an opinion as such, "why would attackers try to break in again, especially after we have fixed the system's vulnerabilities?" is only a matter of time before a cyber attack will occur again, leading to disrupted systems, stolen data, and many other consequences.
More -
Cyber security recommendations for 2022: how to not repeat mistakes from 2021?
2022 01 103 min readRead more to acknowledge the recommendations to help prevent or reduce the damage caused by cyber-attacks to your organisation in 2022.
More -
Old and unattended systems are easy prey for hacker
2021 02 264 min readNearly 800,000. It is the amount of data of various systems and service users leaked in just a week. I would hazard a guess that this is just the tip of the iceberg, and we will hear about stolen personal data more than once. The only way to prevent malicious intent and properly store customer data entrusted to companies is to answer the following question: “Is the system intended to protect personal data and other sensitive information really suitable for this purpose?”
More -
Stay aware: You can experience an attack from your employee’s vacuum cleaner
2020 09 022 min readBreaking into a computer or phone is not an easy task for even an experienced hacker, so the villains have turned their sight to other devices in recent years. More precisely, billions of them. We are talking about the Internet of Things (IoT) – internet-connected devices that are not usually given much attention to the safety of manufacturers or the people who use them.
More -
Tricks to create a good password: emojis instead of traditional combinations and fingerprints?
2020 08 252 min readNow, there are more ways and options for securing your devices or virtual profiles than ever before. Besides the typical passwords or PIN codes, you can use your fingerprints, face recognition and even combinations of emojis. Each of these options has
More -
Online criminals target both people and businesses
2020 08 202 min readThe internet is opening up various possibilities for everyone: from making video calls between Lithuania and England, to discovering new recipes. There are also plenty of opportunities for companies to find new
More -
Expensive lessons from data protection violations
2020 02 192 min readA GBP183.4 million (around EUR207 million) fine for British Airways; a GBP99 million (EUR112 million) fine for the Marriott hotel chain; a EUR50 million fine for web giant Google. Such staggering figures prove that non-compliance with requirements of the General Data
More -
Whaling phishing or how social engineering works
2019 08 301 min readSocial engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information.
More