Our articles

Social media – now a key sales channel

If you have something to sell, developing a presence on social media can prove to be a profitable strategy, whether you are targeting a B2B or B2C clientele. However, to use these channels successfully, you need to take a consistent approach and regularly share relevant content.

Read this article

Published on

06 April 2021

Anatomy of a Red-Team exercise - Chapter 1

A Red Team engagement can be shortly described as a real-life targeted attack simulation. As a threat actor, it uses a blended approach through several facets of social engineering, physical intrusion, application/network penetration testing, targeted phishing campaign… simultaneously to reach some pre-defined objectives.

Read this article

Published on

22 March 2021

Cybersecurity: how to reduce false positives

Increased scrutiny of network infrastructure has sent the number of security alerts skyrocketing. However, IT teams have a tendency to ignore these alerts amid so much crying wolf, and this poses a critical security risk to their business.

Read this article

Published on

04 February 2021

Contact us

Do you have any questions about an article? Do you need help solving your IT issues? 

Contact an expert

Our experts answer your questions

Do you have any questions about an article? Do you need help solving your IT issues?