IPSec or SSL? What type of VPN tunnel to use

IPSec or SSL? What type of VPN tunnel to use

Today it seems trivial, but establishing a connection between two offices used to be not so simple process. First, it was necessary to install dedicated long distance links between two units. Undoubtedly, dedicated links are expensive. Then, there was a setup phase,...
Promote a secure remote work experience

Promote a secure remote work experience

Does your company allow employees to use personal devices to access corporate platforms? Probably yes. And this is a good business practice for those who need to work remotely, either in an outside meeting or on a business trip. Enabling remote access is the first...
Be alert to frequent types of phishing

Be alert to frequent types of phishing

Deceitful messages are frequent vectors to promote digital scams. Key targets include theft of information and privileges, installation of unwanted or malicious applications, and the infection of multiple devices connected in a corporate network. However, at times the...
How businesses can increase security in using WhatsApp

How businesses can increase security in using WhatsApp

We live in an era where quick answers is unquestionable. It is no coincidence that research shows that WhatsApp is the third most used social network in the world, with over 1.5 billion users – if we consider other instant messaging systems, we will see that no...
5G impacts on cybersecurity

5G impacts on cybersecurity

Among the changes brought by technology, few innovations have been as striking to the lives of people and companies as the mobile Internet. Thanks to the mobile connection, we can access and manage the most diverse types of applications, sharing information at an...