• 01/02
    Data Privacy Legislations
    Remote Work

    Employee Monitoring: Surveillance For The Remote Work Era

    For some of us, working from home is a blessing in disguise. We traded the nosy eyes of our coworkers and superiors for the peace and quiet of our home. But what about the organizations that weren’t ready for remote work? What did the pandemic cause in our bosses, accustomed to watch us every day?

    Continue Reading
  • 02/02
    Cyber Security

    Types of Encryption: Symmetric or Asymmetric? RSA or AES?

    If you’re looking to encrypt data to protect it, you might find there are different encryption methods and encryption algorithms to pick from. From RSA to AES, your pick should be informed by context.

    Continue Reading
The Essentials to Cybersecurity eBook
The Essentials to Cybersecurity eBook

Kickstart your IT cybersecurity strategy with this crash course!

Know Key Data Protection Laws and How to Comply With Them
Know Key Data Protection Laws and How to Comply With Them

1 Week email course, no charge.