Leaders leverage our blog to stay up to date on latest cybersecurity practices and learn how to keep their data safe.

No. (more details below )
Spoiler alert: yes. Previously, here , we looked into phishing and some of the actions you could take to protect yourself. This time, we want to dive a little deeper into what makes email so...
ALCiT announces the opening of its US office
Let’s start at the beginning: What is phishing?
BUSINESS OF CANNABIS TO BE “PROTECTED BY” ALCiT
The conversation usually goes something like this: Hey, company X that (we do business with / my friend works at / we share some clients with…) just got ransomwared and were down for Y days/weeks, is...
As many of our customers, I am sure many of you are now working from home (if you can) and getting used to the new [temporary] normal. We wanted to provide a couple of tips and tricks to provide a...
I wish I did not have to write this one, but it looks like I must. In these times of chaos, where we all should be focusing on the safety of our families, friends and communities, it appears that...
If you look at a standard maturity index for processes (such as COBIT or ITIL), they propose five level:
Meeting room systems have always been full of issues. In our experience, these are the main ones:
Continuing our goal of providing a high-level overview of the things you should be doing to be more Cybersecure, this is part 3 of 5. You now have started to take some decisions on how to protect...
In the spirit of the Cyber Security Awareness Month, we wanted to do a five part article on the Five Functions of NIST (National Institute of Standards and Technology). The goal is to provide a...