Alarm or alert fatigue is much older than our current cyber-technology. It represents the state of de-sensitization to alerts due to their overwhelming frequency or number, and it was previously met in industrial environments. As the denomination suggests, individuals whose main activity resides in
Once a company’s IT system has been breached or infected, there are standard procedures to follow, in order to make sure all malicious elements are removed and for the system to safely re-engage in the usual activities. Bigger companies employ specialized services for cyber-security system setting
As some of you may have noticed in different occasions, sometimes our Internet interactions come up as puzzling experiences. For example, I spotted this foreign-sounding words in the denomination of a Facebook image whose link I received while being logged out of my account: Beveiligingscontrole.
Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need to employ macros on a daily
What should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational cyber-strategies when it
Ignorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove extremely costly over time. Human