Erol Aydin5 min readYou have been attacked? Cyberattack: The first steps in an emergencyHow does a company manage to react quickly when it becomes the victim of an attack? In order not to be caught cold if the worst comes to...
Erol Aydin4 min readCybersecurity with hashingHashing is a cryptographic process that can be used to verify the authenticity and integrity of various data types....
Erol Aydin3 min readSMEs crippled by cyber attackAs the mid-2021 Acronis Cyberthreats Report shows, we saw many new developments like the one in Anhalt-Bitterfeld in the first half of...
Erol Aydin4 min readThe zero trust environment - How network security worksUntil now, the "castle and moat" approach, also known as perimeter security, was considered the most effective method against cyber threats.
-4 min readDDos Attack - The Underestimated dangerDDoS attacks quickly cause enormous financial damage, not to mention possible image damage. But the threat...