2023-02-17
6 Leading Trends in Warehouse Management and Warehouse Automation for 2023
The new year brings new challenges which warehouse managers and operators will have to face. We picked the 6 most dominant…
2021-08-16
Use their Weapons to Fight Hackers
To defend against computer criminals you must think like them. Advanced threats require advanced solutions. Among the solutions…
2021-02-03
Digital profile of the organization. What to look out for regarding information about your company?
The digital era brings opportunities as well as threats. and not only in the ordinary digital life of individual users, but…
2021-01-28
Is personal data protection still topical?
January 28th is Data Protection Day. It is the day we remember the importance of protecting the most valuable thing we have,…
2020-05-07
Password as the First Instance of Protection
Did you know that every 39 seconds a hacker attack takes place, over 2,600 personal records are stolen every minute and that…
2020-03-26
Data Protection in the Times of the Coronavirus. 7 Tips on How to Share Work Safely
The economy is undergoing significant transformations in this time of the spread of the Coronavirus. Companies which haven’t…
2019-11-29
Life in data. How to protect data on your computer?
These days, a computer normally accompanies a person all day long. Very often it is a working tool, a way of connecting friends,…
2016-07-27
eIDAS, new European regulation simplifies signature-based electronic transactions
The new regulation concerning electronic identification and trust services for electronic transactions in the internal market…
2016-04-20
How to protect data from privileged users
Cyber-attacks are an increasingly frequent topic of discussion these days, and part and parcel of the use of modern information…
2015-09-10
Everything That Can Go Wrong with IT Outsourcing
Companies that decide to outsource part of their IT or entrust an external partner with their entire IT infrastructure have…
2015-06-10
Don’t Be Fooled by the Illusion of Security
Internet, except at its very beginning when it operated only in the academic environment, has never been a completely secure…
2015-03-23
When your company does not need IT outsourcing
If you have ever considered IT outsourcing or were at least interested in what such model could bring, you’ve probably already…