Category: DeCrypted Blog

Connect.Protect

Upgrading your firewall? Here’s everything you need to know

Time to Upgrade Your Firewall   Chances are that you already have a firewall but if you have been following the technology updates in the network security space or have read either of our previous blogs on this topic, you would like your business to benefit from the recent advancements in a Next-Generation Firewall (NGFW solution).…
Read more

A New Era of European Cyber Defence – looking ahead to 2023

The increase in hybrid working, a more global workforce and the ongoing Russia-Ukraine war have led to a new era in European cybersecurity. Now, more than ever, businesses need to be wary of cyber criminals and ensure that their cybersecurity solutions are effective in protecting data and effectively securing their networks.  Hybrid working  Hybrid working…
Read more

What is security delivered as a cloud service and why is it important alongside your next-generation firewall (NGFW)?

Security delivered as a cloud service is a collection of security measures which are designed to protect cloud-based infrastructure, web applications and data. Next-generation firewalls (NGFWs) are enhanced with several features which ensure protection against a multitude of cybersecurity threats. However, firewalls, including NGFWs, only protect network entry points. Due to remote working, employees work…
Read more

Next Generation Firewalls – an overview

The list of potential cyber threats facing businesses is growing in size and severity almost daily, so securing your network is now truly non-negotiable. The easiest and most effective way to ensure protection is by installing a next-generation firewall (NGFW) solution. This blog will take you through all you need to know about next-generation firewall…
Read more

The Art of Cyberwar

2 500 years ago, the general and military strategist Sun Tzu wrote the book The Art of War. It is a classic book on military strategy which is still being referenced at military schools around the world.   Let’s reflect on what has changed since then. Are Sun Tzu’s wisdoms still relevant? One major difference is technology and weapons, which of course…
Read more

World Password Day Signals Perfect Time to Reveal Clavister EasyAccess 3.2

Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords are critical gatekeepers of our digital identities, allowing us to access online shopping, dating, banking, social media, private work, and life communications. Passwords are critical to our digital life, yet we are extremely poor at remembering good versions of them.…
Read more

How to Remote Work Like a Boss

With remote working becoming our new normal, there are a few things you need to do to be safe and effective. Some professions like nurses, firefighters, mailmen and clerks will not be able to change to a ”work-from-home” mode as the world around us changes. However, a large number of us have the luxury to…
Read more

How Tech Will Beat COVID-19

With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the meantime is for technology to save the day. Here’s how… By now we’ve all become almost fatigued with the news cycle’s daily curves that grimly tell the tale of our times. That the COVID-19 virus…
Read more

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable. The vault itself was protected by ten impregnable layers of security including magnetic, light and heat sensors; infrared motion detectors and seismic detection warnings as…
Read more

Looking Into The Future: Trends in Identity & Access Management

Identity & Access Management is a very hot segment of the market right now. Specifically access management—as everyone has truly come to the understanding that passwords are our biggest enemy—is racing to remove them. But IAM is much more than that—it combines key areas: Secure Authentication —facilitating the multi-factor authentication in a user-friendly way, Network…
Read more