Leaders leverage our blog to stay up to date on latest cybersecurity practices and learn how to keep their data safe.

You’ve heard about cybersecurity; you want some and not sure where to start? This cybersecurity 101 is the right place! It explores some of the basic concepts of cybersecurity and provides you...
No. (more details below )
Spoiler alert: yes. Previously, here , we looked into phishing and some of the actions you could take to protect yourself. This time, we want to dive a little deeper into what makes email so...
ALCiT announces the opening of its US office
Let’s start at the beginning: What is phishing?
BUSINESS OF CANNABIS TO BE “PROTECTED BY” ALCiT
The conversation usually goes something like this: Hey, company X that (we do business with / my friend works at / we share some clients with…) just got ransomwared and were down for Y days/weeks, is...
As many of our customers, I am sure many of you are now working from home (if you can) and getting used to the new [temporary] normal. We wanted to provide a couple of tips and tricks to provide a...
I wish I did not have to write this one, but it looks like I must. In these times of chaos, where we all should be focusing on the safety of our families, friends and communities, it appears that...
If you look at a standard maturity index for processes (such as COBIT or ITIL), they propose five level:
Meeting room systems have always been full of issues. In our experience, these are the main ones:
Continuing our goal of providing a high-level overview of the things you should be doing to be more Cybersecure, this is part 3 of 5. You now have started to take some decisions on how to protect...