(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime() ,event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:' ';j.async=true;j.data-privacy-src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-KRGN3FN');
Blog
Technology Business Review

Technology Business Review If you've ever dealt with an IT department, specialist, or outsourcer, the phrase "technology business review" should come to mind. [...]

Case study - Phishing attack

Phishing attack Client's business card Bulgarian company operating on global markets. Geletron customer for 5 years. In the specific case study [...]

Case Study – Classic Hacking Attack

Classic hacker attack Client's business card The client is engaged in the import and trade of nutritional supplements. There is a physical store, an online store, an office [...]

What is Computer Support?

What is Computer Support? What is computer support? In short, it is an external or internal unit that provides IT solutions or the same service of the same name. [...]

IT security when working remotely

IT security when working remotely. Offices are opening more and more, and a large number of professions are flexibly re-adjusting to the new digital reality. The remote one [...]

Geletron presents interesting articles, studies and practices from the world of IT technologies.
Subscribe now to always receive up-to-date information from our blog.

    Your Name: *

    Your email address: *

    Go to Top