Select Page

BLOG BLOCKBIT

Exclusive articles on Cybersecurity, Technological Innovation and Insights from Blockbit Labs on threats.

Do you know what ZTP is? (Zero Touch Provisioning)

Do you know what ZTP is? (Zero Touch Provisioning)

With the transformation of corporate environments due to the pandemic, companies are reviewing their business strategies, including how they deploy and manage their devices. Zero Touch Provisioning ...

4 advantages of using a Next Generation Firewall

4 advantages of using a Next Generation Firewall

New security features are constantly being developed by the industry with the aim of protecting corporate environments and assets. However, the firewall remains one of the fundamental controls for...

Web Filter: Why is content filtering so important?

Web Filter: Why is content filtering so important?

In the early years of using the internet, IT managers did not face great difficulties in defining what type of content employees could access within a corporate network. At that time, the use of a...

What is IPS (Intrusion Prevention System)?

What is IPS (Intrusion Prevention System)?

With the significant increase in cyber threats in recent years, the search for preventive network security tools and strategies has gained a lot of relevance. An Intrusion Prevention System, or IPS,...

I was the victim of a cyberattack… What now?

I was the victim of a cyberattack… What now?

Server hacking. Leakage of sensitive data. Blocking access to information. Ransom demands. A number of problems can occur when experiencing a cyberattack. With that in mind, in this article we have...

The new digital security challenges of delivery

The new digital security challenges of delivery

It may seem like an exaggeration to think so, but digital security will be a priority item for people and companies. Have you ever thought about how a restaurant delivery service can impact your...

The value of organizational culture in companies

The value of organizational culture in companies

People are without a doubt the greatest asset of any company. Most likely, at some point in your career, you may have come across that phrase by now. After all, they are the people who plan and...

Cybersecurity in streaming services

Cybersecurity in streaming services

Amidst the COVID-19 pandemic, the expression "home, sweet home" has gained a new meaning. That's because for millions of people, staying at home is the new reality, with the entire world in just one...

Home Office and Enterprise Network Security

Home Office and Enterprise Network Security

Amidst the Covid-19 pandemic, companies all over the world are adopting remote working models, encouraging home office culture like we have never seen before. However, although this is a practical...

5 ways you could be a victim of a Phishing attack

5 ways you could be a victim of a Phishing attack

Phishing is a social engineering procedure that usually involves using a fake message or email to deceive the user and convince them to take action to benefit the cybercriminal. According to Google,...

No one is safe: Coronavirus and cybersecurity

No one is safe: Coronavirus and cybersecurity

Coronavirus has put the entire world on high alert. There are many reasons one could point out: the spread across the planet has shown that the virus is faster and lethal than we could imagine. What...

Promote a secure remote work experience

Promote a secure remote work experience

Does your company allow employees to use personal devices to access corporate platforms? Probably yes. And this is a good business practice for those who need to work remotely, either in an outside...

Be alert to frequent types of phishing

Be alert to frequent types of phishing

Deceitful messages are frequent vectors to promote digital scams. Key targets include theft of information and privileges, installation of unwanted or malicious applications, and the infection of...

5G impacts on cybersecurity

5G impacts on cybersecurity

Among the changes brought by technology, few innovations have been as striking to the lives of people and companies as the mobile Internet. Thanks to the mobile connection, we can access and manage...

How to mitigate insider threats

How to mitigate insider threats

Looking at the threats that are within the walls of your company is as important as looking out. According to a study conducted by Crowd Research Partners [1], insider threats are a major concern...

You need centralized security management

You need centralized security management

Thousands of devices and applications used by corporate users generate an endless amount of data. However, mountains of data do not always provide valuable information. If you want to take the best...

IPS or IDS: what do you need?

IPS or IDS: what do you need?

Managing digital threats is a growing priority for all businesses. Private network defense systems use diverse techniques to identify and prevent violations and recognition activities in a private...

DoS and DDoS: understand and protect your data

DoS and DDoS: understand and protect your data

Denial of Service (DoS) attacks are designed to make a server unavailable by blocking the execution of tasks. They are more common to WEB servers, but with no delivery of malicious loads. In effect,...

Protect your applications from brute force attacks

Protect your applications from brute force attacks

For cybercrime, private accounts protected by authentication keys are valuable sources of information. Email services, banking applications, e-commerce portals and social networks, for example, gain...

What is Cross-site Scripting (XSS)?

What is Cross-site Scripting (XSS)?

Cross-site Scripting (XSS) is a type attack that injects malicious code in web applications, ranked among the top vulnerabilities in OWASP Top 10 2017. For example, an attacker takes advantage of a...

Schedule a meeting now and learn how our solution can protect your business.

Advanced, robust solution with innovative features that reduce your uptime, such as automated setup, centralized management, and intuitive processes.

BLOCKBIT is committed to protecting your privacy. This Privacy Policy describes how we collect, use, and share your personal information when you visit our website or use our services. If you have questions about our Privacy Policy or wish to exercise your privacy rights, please contact us at privacy@blockbit.com. Privacy Policy - EULA - EOL - Cookie Statement