3 Reasons Why Your Company Needs Encryption

3 Reasons Why Your Company Needs Encryption

With over 3,800 data breaches reported until the end of June and over 4.1 billion records exposed, 2019 is on track to become the worst year on record for data breaches according to a report recently published by Risk Based Security. The number of breaches...
Collaboration Security: How to Safeguard Workstream Collaboration Data?

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...
Collaboration Security: How to Safeguard Workstream Collaboration Data?

Collaboration Security: How to Safeguard Workstream Collaboration Data?

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration. Communication in the workplace keeps evolving and workstream...
Endpoint Protector KEXTs Notarized by Apple

Endpoint Protector KEXTs Notarized by Apple

With the release of the macOS Mojave 10.14.5, Apple has introduced a new security feature called kernel extension (KEXT) notarization. This marks a significant change in the way third-party kernel extensions are handled, more specifically it means that KEXTs signed...
What’s New in Endpoint Protector 5.2.0.6

What’s New in Endpoint Protector 5.2.0.6

The new version of Endpoint Protector is out and is set to deliver a new series of improvements and upgraded features. This article lists the most important updates and enhancements of Endpoint Protector 5.2.0.6 that are of interest to our clients....
Terminate Malware – Prevent your Endpoints from Cyberattacks

Terminate Malware – Prevent your Endpoints from Cyberattacks

Digitalization opens up new business models and lays the foundation for process optimization. The shift to digitalized processes does have its downsides, though. For example, cyberattacks are an absolute nightmare for companies of all sizes. There is, however, an...