Blog

Blog

  • Illustration

    Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method

    Арril 5, 2023
    Article

    Organizations face a growing danger from phishing and ransomware, which have been the most common forms of cybercrime in recent years. Most businesses have fallen victim to phishing or ransomware attacks at some point. Every business needs to act against the growing threat of phishing, the primary method through which ransomware and other malware are spread. On the bright side, organizations have a lot of flexibility in how they respond to these threats.

  • Illustration

    Core Impact vs Metasploit vs Pentera: Pentest Tools Comparison

    March 1, 2023
    Article

    The first successful hacker attack breaks confidence in the reliability of solutions and data safety. The company is experiencing losses and a blow to its reputation. They face a terrible question: "What if this happens again?". So, please welcome penetration testing – the chance to look at your defence through the hacker's eyes and fix all the gaps based on the report received. Below, we talked about the concept of "pentesting", the benefits of conducting an independent penetration test, the issues of choosing the right tool and the potentials of the solution from Fortra – Core Impact. 

  • Illustration

    Merging people and technologies as the basis of company security

    February 21, 2023
    Article

    People can't manage data protection without technology, and technology can't manage it without people. Myroslav Bondar, Head of the B1 Department at BAKOTECH, tells how to combine human approaches and mutual integration of technologies to create an effective safety culture. 

  • Illustration

    Data Loss Prevention: How does the popular class of solutions work?

    February 17, 2023
    Article

    Data protection is a basic, but complex task for any company. Data Loss Prevention (DLP) is typically used for counteracting information leaks. Eugene Borodai — the Sales Engineer for Digital Guardian data leak and Boldon James user data classification solutions in BAKOTECH — tells how the solution works, what types of data there are, and how to protect them.