(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime() ,event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:' ';j.async=true;j.data-privacy-src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KRGN3FN');
Blog
NIS2

Какво е NIS2 и как да се подготвим? NIS (Network and Information Security) е европейска директива за мрежова и информационна сигурност. Първата версия – [...]

Technology Business Review

Technology Business Review If you've ever dealt with an IT department, specialist, or outsourcer, the phrase "technology business review" should come to mind. [...]

Case study - Phishing attack

Phishing attack Client's business card Bulgarian company operating on global markets. Geletron customer for 5 years. In the specific case study [...]

What is Computer Support?

What is Computer Support? What is computer support? In short, it is an external or internal unit that provides IT solutions or the same service of the same name. [...]

IT security when working remotely

IT security when working remotely. Offices are opening more and more, and a large number of professions are flexibly re-adjusting to the new digital reality. The remote one [...]

Geletron presents interesting articles, studies and practices from the world of IT technologies.
Subscribe now to always receive up-to-date information from our blog.

    Your Name: *

    Your email address: *


    Go to Top