Network infrastructure for industrial purposes
Building a network for industrial purposes In this article, we describe how we built a reliable network for industrial purposes, tailored to modern requirements. We combined [...]
Technology Business Review
Technology Business Review If you've ever dealt with an IT department, specialist, or outsourcer, the phrase "technology business review" should come to mind. [...]
Case study - Phishing attack
Phishing attack Client's business card Bulgarian company operating on global markets. Geletron customer for 5 years. In the specific case study [...]
Case Study – Classic Hacking Attack
Classic hacker attack Client's business card The client is engaged in the import and trade of nutritional supplements. There is a physical store, an online store, an office [...]
Case Study - Communication above all else
Communication first The Geletron team has many years of experience in building, maintaining and managing IT systems. For us, every decision is [...]
Pirated software - the white sugar of the IT world
Pirated software - the white sugar of the IT world Pirated software is one of the modern temptations. On the one hand, the advantage to [...]
Microsoft 365 and Office 365 – solutions for every situation
Microsoft 365 and Office 365 - solutions for every situation Nearly 155 million are the active users of Microsoft Office 365, according to [...]
The desktop computer - classic or obsolete
What should we choose? The desktop computer - classic or obsolete How to choose the right computer? When there is a lack of knowledge in this area, it seems like a mission [...]
What should we choose? Laptops of business breed
By protocol If you are better oriented in the characteristics and abundance of the market, we offer you a table with a comparison of parameters of the most preferred laptops through [...]
IT budgets in the age of Aquarius
IT Budgets in the Age of Aquarius The format of remote office work and the related almost forced innovations have raised new questions, especially [...]
Ransomware - the dark side of new technologies
Ransomware - the dark side of new technologies Ransomware is in the top 5 threats in general and a significant danger in the field of [...]
Employee Monitoring Software - Virtuoso Management
Employee Monitoring Software - Virtuoso Management Trust is everything. In the workplace it gives a sense of reciprocity and shared goals. On [...]
Social Engineering - A Complete Course in Psychology
Social Engineering - A Complete Course in Psychology Social engineering is a collection of diverse and evolving manipulation techniques to achieve [...]
How to protect email communication?
How to protect email communication? Every day, over 200 billion emails are sent worldwide, and some of them contain sensitive corporate information [...]
Data backup: security in a dynamic environment
Data backup: security in a dynamic environment The loss of a database is a critical moment for any company and although in different [...]
What is Computer Support?
What is Computer Support? What is computer support? In short, it is an external or internal unit that provides IT solutions or the same service of the same name. [...]
Business communication in an electronic environment
Business communication in an electronic environment Online communication is increasingly facilitating business. Thanks to the Internet, companies of all sizes can now [...]
Cloud Times: Predictions for the Public Cloud
Cloud Times: Predictions for the Public Cloud In recent years, cloud computing technology has changed the way many companies operate. But how wide [...]
Healthy filtering of web content in the office
Healthy filtering of web content in the office The Internet is both amazing and terrifying: this revolutionary technology that has changed the world is an enabling environment [...]
Technology in the workplace - a long-term or fleeting purchase?
Technology in the workplace - a long-term or fleeting purchase? Nothing lasts forever. This is especially true for technology. And how much [...]
IT security when working remotely
IT security when working remotely. Offices are opening more and more, and a large number of professions are flexibly re-adjusting to the new digital reality. The remote one [...]
Geletron practice TCO. Part 2
Example 2: Prioritizing tasks and what misallocating resources can cost us. Let's say we hired an IT support company, [...]
TCO in IT or the secret of meaningful IT equipment. Part 1
TCO in IT or the secret of meaningful IT equipment. Part 1 Technology is now an indispensable tool in the work of every office. Sometimes [...]
Is your password strong enough?
Is your password strong enough? Password Tester Want to find out if your password is secure enough? Find out how much [...]
How to improve wireless network signal?
How to improve wireless network signal? In this article we will explain why it happens that often the connection is with our WiFi [...]
Geletron presents interesting articles, studies and practices from the world of IT technologies.
Subscribe now to always receive up-to-date information from our blog.