Information security guide for new employees

Information security guide for new employees

An information security guide can help minimize related errors, but writing one from scratch is quite challenging. To that end, we offer a general plan, a basic guide to which you can add points specific to your company and its rules and regulations. In our opinion,...
WHY IS CHANGE MANAGEMENT AND ADOPTION SO IMPORTANT?

WHY IS CHANGE MANAGEMENT AND ADOPTION SO IMPORTANT?

If the pandemic has been the biggest accelerator to digital transformation, then a lack of change management might be the most significant restrictor to progress. Companies across the country were quick to adapt to remote working, ensuring employees had the equipment,...
The Ghosts of Mirai

The Ghosts of Mirai

It has been almost five years since the source code of the notorious MIRAI IoT malware was released to the public by its author in late 2016. This event led to the emergence of numerous copycats, creating their own flavors of IoT botnet armies. Although improvements...
How Zoom moved toward end-to-end encryption

How Zoom moved toward end-to-end encryption

Zoom’s presentation at RSA Conference 2021 focused on end-to-end encryption in Zoom Cloud Meetings. The company explained why its developers are focusing on the issue, how they plan to make calls more secure, and what other new, security-related features users can...