When we presented our last report in 2020, we didn’t expect that in only two years the world would be in a completely different state. Social behavior, the way we…

Security 101
Mobile Theft and Loss Report – 2020/2021 Edition
When we presented our last report in 2020, we didn’t expect that in only two years the world would be in a completely different state. Social behavior, the way we…
Learn how one of the most critical vulnerabilities on the internet today may affect your organization, and how you should mitigate its potential effects.
Did you know that laptop computer have a 1-in-10 chance of being stolen, which means that there is a 10% chance for you to be the victim of laptop theft….
There are few more exciting moments in the life of a person than the hours after purchasing a new computer. It is like buying a car. All you want to…
Threat detection is a critical aspect of cybersecurity protection today. The importance of threat detection increases as quickly as bad actors adapt attack methodologies. A strong threat detection strategy has…
If you’re thinking “that’s just spam, right?” you couldn’t be more wrong. Make sure you know what phishing and spear-phishing look like to avoid falling for it.
Know how to keep an eye open for our privacy in your iPhone or Android phone, where apps and services alike relentlessly gather your every move to create digital behavior profiles without your consent.
What is Incident Response? Incident response is the process of identifying, investigating, and recovering from a potential cybersecurity incident. It covers everything from the initial indication that an intrusion may…
Cellphone theft has been rising quite considerably. So much so that the chances of getting your device snatched is becoming a scarily common occurrence. In London, 314 phones are stolen…
Companies’ IT infrastructures are growing more complex. With the rise in remote work and bring your own device (BYOD) policies, organizations have a more diverse set of corporate devices and…