Our Blog
Three Characteristics of a Secure Webshop
What we most often see going wrong, and how to prevent incidents! Every webshop will, sooner or later, face digital
Read more >The Hidden Risks of Third-Party Connections
Third-party tools make modern businesses possible. They connect systems, automate processes, and keep information up to date across platforms. Most
Read more >The Odido Hack: One of the Netherlands’ Largest Telecom Data Breaches
Earlier this month, Dutch telecom giant Odido revealed a major data breach affecting millions of customers. The headlines focus on
Read more >Why We Click Bad Links: The Psychology of Cyber Risk
Many high-profile cyber incidents start with a simple human error. For example, CEOs’ emails are sometimes faked to request wire
Read more >Don’t Let Cybersecurity Be Your New Year’s Resolution – Start Small, Start Now!
It’s that time of year again. The festive lights are up, the mince pies are out, and everywhere you look,
Read more >