Select Page

BLOG BLOCKBIT

Exclusive articles on Cybersecurity, Technological Innovation and Insights from Blockbit Labs on threats.

Put up your defenses against botnets

Put up your defenses against botnets

What is a Botnet? Botnets are networks of devices with data processing capability, controlled by malicious individuals or groups to promote unwanted or cybercriminal activities. In general, botnets...

Build barriers against DNS attacks

Build barriers against DNS attacks

DNS (Domain Name System) servers make it easier to browse the internet every day because they translate nominal addresses (ex.: websites) into IP addresses, which are much simpler for most users to...

Blockbit Introduces the SD-WAN 2.0 Solution

Blockbit Introduces the SD-WAN 2.0 Solution

Integrated with Blockbit Platform 2.0, the new version of the platform also offers enhanced network management features and zero-touch functionality, which allows for a completely remote...

Can you recognize the most common types of malware?

Can you recognize the most common types of malware?

To recognize which malicious applications we should protect ourselves from is an important step to define a security plan and to choose the right protection controls. So, do you know witch are the...

Viruses and malware: what’s the difference?

Viruses and malware: what’s the difference?

Viruses and Malware are common themes in information security. Although they are cyber threats, there is a difference between them. In a simple and straightforward way: viruses are types of malware,...

Encryption is a must, inspection too

Encryption is a must, inspection too

Cryptography applied to data traffic is an essential security technique that every company can relate. On the one hand, it is a growing demand to maintain information confidentiality, especially...

The challenges of GDPR

The challenges of GDPR

GDPR will address different demands within the compliance rules that all global companies should follow.

The more authentication the better

The more authentication the better

Passwords aren’t history, nor are they the only tools we should turn to create a safer environment for users of our products – and therefore for the protection of corporate information. For...

What is your disaster recovery plan?

What is your disaster recovery plan?

Has your company reached the point where all data protection strategies have been considered? You need to be a disaster recovery plan.

5 controls your business need to adopt right now

5 controls your business need to adopt right now

Information security is not for amateurs. In 2018, 16,500* new vulnerabilities were reported, a 13% growth over the previous year. Do you think 2019 will be less risk than the year before? Among the...

5 cybersecurity myths to delete from your mind

5 cybersecurity myths to delete from your mind

Every market prediction say that digital threats tend to grow in the coming years. Any company that has some type of operation that depends on connectivity is subject to risks.

SD-WAN will make your business more competitive

SD-WAN will make your business more competitive

Software-defined networks, SD-WAN, is becoming an increasingly important subject for companies that need to get around the challenges of connecting multiple locations (branch offices, datacenters, cloud, etc.) more efficiently and at a lower cost.

What is SD-WAN? Reasons your company should adopt

What is SD-WAN? Reasons your company should adopt

SD-WAN (software-defined wide area network) is a network architecture approach that enables communication between distant points. In effect, it is virtualization of WAN (wide area network).

5 simple tips to protect your costumers

5 simple tips to protect your costumers

With digital transformation, most companies not only have online presence, but also want to leverage technologies to optimize the user experience, whether the end customer or the corporate customer.

Schedule a meeting now and learn how our solution can protect your business.

Advanced, robust solution with innovative features that reduce your uptime, such as automated setup, centralized management, and intuitive processes.

BLOCKBIT is committed to protecting your privacy. This Privacy Policy describes how we collect, use, and share your personal information when you visit our website or use our services. If you have questions about our Privacy Policy or wish to exercise your privacy rights, please contact us at privacy@blockbit.com. Privacy Policy - EULA - EOL - Cookie Statement