Network infrastructure for industrial purposes
Building a network for industrial purposes In this article, we describe how we built a reliable network for industrial purposes, tailored to modern requirements. We combined [...]
Technology Business Review
Technology Business Review If you've ever dealt with an IT department, specialist, or outsourcer, the phrase "technology business review" should come to mind. [...]
Case study - Phishing attack
Phishing attack Client's business card Bulgarian company operating on global markets. Geletron customer for 5 years. In the specific case study [...]
Case Study – Classic Hacking Attack
Classic hacker attack Client's business card The client is engaged in the import and trade of nutritional supplements. There is a physical store, an online store, an office [...]
Pirated software - the white sugar of the IT world
Pirated software - the white sugar of the IT world Pirated software is one of the modern temptations. On the one hand, the advantage to [...]
Ransomware - the dark side of new technologies
Ransomware - the dark side of new technologies Ransomware is in the top 5 threats in general and a significant danger in the field of [...]
Employee Monitoring Software - Virtuoso Management
Employee Monitoring Software - Virtuoso Management Trust is everything. In the workplace it gives a sense of reciprocity and shared goals. On [...]
Social Engineering - A Complete Course in Psychology
Social Engineering - A Complete Course in Psychology Social engineering is a collection of diverse and evolving manipulation techniques to achieve [...]
How to protect email communication?
How to protect email communication? Every day, over 200 billion emails are sent worldwide, and some of them contain sensitive corporate information [...]
