top of page
Erol Aydin
5 min read
You have been attacked? Cyberattack: The first steps in an emergency
How does a company manage to react quickly when it becomes the victim of an attack? In order not to be caught cold if the worst comes to...
0
Erol Aydin
4 min read
Cybersecurity with hashing
Hashing is a cryptographic process that can be used to verify the authenticity and integrity of various data types....
0
Erol Aydin
3 min read
SMEs crippled by cyber attack
As the mid-2021 Acronis Cyberthreats Report shows, we saw many new developments like the one in Anhalt-Bitterfeld in the first half of...
0
Erol Aydin
4 min read
The zero trust environment - How network security works
Until now, the "castle and moat" approach, also known as perimeter security, was considered the most effective method against cyber threats.
0
-
4 min read
DDos Attack - The Underestimated danger
DDoS attacks quickly cause enormous financial damage, not to mention possible image damage. But the threat...
0
bottom of page