Η Δράση “Ψηφιακός Μετασχηματισμός Μικρομεσαίων Επιχειρήσεων” είναι μέρος του Εθνικού Σχεδίου Ανάκαμψης και Ανθεκτικότητας Ελλάδα 2.0, και στοχεύει στην ενίσχυση της ψηφιακής ωριμότητας των μικρομεσαίων επιχειρήσεων (ΜΜΕ) της χώρας, με σκοπό να εκσυγχρονίσουν την παραγωγική, εμπορική και διοικητική τους λειτουργία. Μέσω του Προγράμματος οι συμμετέχουσες επιχειρήσεις, μεταξύ των άλλων θα μπορούν να ενισχυθούν προκειμένου να αυξήσουν […]
Students are officially back to school. However, while the times are certainly exciting for youngsters, the reliance on technology has created a list of possible pitfalls that could easily be avoided. Students of all ages in school generally receive IT support, but sometimes things that are obvious for some may not be as evident to […]
The Metaverse is defined as a network of connected virtual worlds that use virtual reality (VR) and/or augmented reality (AR) technologies to offer a more immersive experience for users. Although the concept has been around for three decades (it comes from the science fiction novel “Snow Crash”) and it forms the basis of platforms such […]
In the case of small businesses, it is well known that employees are even more important as the first line of defense in cybersecurity, as small businesses often do not have the specialized personnel or the resources of large organizations to invest in training them. The available data confirms this: in the United Kingdom alone, […]
Hackers are arguably the most creative members of the underworld. And they are reaching high levels of maturity too. We live in a world where we see hacker groups behave as IT enterprises offering subscription-based ransomware as a service (RaaS). Organizations like LockBit appear to have “customer” service, feature releases, career ladders, and… bug bounty programs. Hackers […]
Pharming is a scam that cybercriminals use to install malicious code on personal computers or servers. As the name suggests, it comes from the words “farming” and “phishing,” and it represents a new, more complicated technique hackers use to access sensitive information. The malicious code involved in pharming attacks changes the IP address information, which […]
Do you need Zero-Trust security? The concept of zero-trust is not new; it’s been around for a decade. But the complexity of today’s business structures and the rise of digital transformation are inspiring organizations to take a different security approach: creating policy-based controls to enable secure access no matter how diverse or disruptive the current […]
Implementing robust defense strategies helps to mitigate the risk of cyberthreats in the early stages of an attack. Threat hunting, as part of this strategy, enables organizations to find those unknown threats that manage to bypass technology-based controls by detecting abnormal behaviours. With a number of challenges associated with executing a defense approach, how are IT […]
In modern business, communication and collaboration become easier than ever. We can work remotely, we can access documents from our smartphone and communicate with our colleagues while we are on the move. Business data is the most important asset in the modern economy. Most of the companies are struggling to secure data assets seamlessly from both […]
The new WatchGuard Endpoint Security (integration with Panda) will be available soon! In an effort to continuous development of products, Watchguard has announced that will soon launch a new version of Panda Endpoint Security. In addition to the improvements related to greater protection against ransomware and any other attacks including exploits, fileless and malwareless attacks, and new Patch Management dashboards, the […]