Logo Logo Logo Logo Logo
  • Home
  • About
    • Contact Us
  • Secure-K @ GitHub
  • DigitalArx
  • News
    • Press Area
  • Blog
  • enEnglish
    • itItaliano
  • Home
  • About
    • Contact Us
  • Secure-K @ GitHub
  • DigitalArx
  • News
    • Press Area
  • Blog
  • enEnglish
    • itItaliano
Businessmen and employees walking

10 Aug Insider Threats: An Enemy Within

Posted at 09:30h in Business, Security by Mon-K Team 0 Comments
0 Likes

Insider threat is an intentional or unintentional misuse of organization’s data by an insider – an employee, a former employee, a subcontractor or a partner – anyone you have kindly granted access to. While ransomware or cyber attack may sound more scary, the vast majority...

Read More
hacker looking for users passwords

19 May How to set a strong password: 9 tips

Posted at 09:00h in Consumer, How To, Security by Flavia Piantino Gazzano 0 Comments
1 Like

Last January, I was talking with a cyber security expert and hacker (he said he is one of the good one). He told me he was doing some penetration test on an oil tanker and he hacked its firmware because the password was 1234. A strong...

Read More
people walking around in the office

27 Apr Cyber-attacks and data breaches: the role of your employees

Posted at 12:30h in Business, How To, Security by Flavia Piantino Gazzano 0 Comments
0 Likes

Cyber-attacks and data breaches are on the rise, and it’s easy to believe they’re all caused by criminal hackers out for financial gain. However, this isn’t the case. Last quarter, it was found that four of the five leading causes of data breaches are because...

Read More
blockchain concept

20 Apr BlockChain: a new technological revolution?

Posted at 12:30h in Consumer, Cryptocurrency by Paolo Ferrari 0 Comments
0 Likes

We discussed BitCoins, we saw what cryptocurrencies are and how they are related to a blockchain. Yet, what is a blockchain? A blockchain is a system that allows the certification of a certain "event" in a decentralized, secure and unchangeable way. Let's look more closely...

Read More
cyber criminal concept, disguise of V for Vendetta

10 Apr 10 ways to protect yourself against cyber crime

Posted at 17:30h in Consumer, How To, Security by Flavia Piantino Gazzano 0 Comments
0 Likes

Cyber crime can change your life in the blink of an eye. Given the opportunity, hackers will take your data, your identity and your finances within minutes.There are some basic precautions everyone using the Internet should take to protect themselves from cyber crime: 1 USE STRONG PASSWORDS. Password...

Read More
desperate person in front of several computer after WannaCry attack

21 Mar The rise of cyber crime

Posted at 13:30h in Consumer, Security by Flavia Piantino Gazzano 0 Comments
0 Likes

Cyber crime is a criminal activity that involves a computer or digital media and a network – in most cases, the Internet. The computer may have been used in the commission of a crime, or it may be the target. Cyber crime may threaten a person...

Read More

09 Mar 9 Alarming cyber security facts and stats

Posted at 12:30h in Business, Security by Flavia Piantino Gazzano 0 Comments
2 Likes

THE SCARY TRUTH ABOUT CYBER SECURITY. Today’s cyber criminals are more high-level than you might think. They work quickly and can easily evade traditional detection methods. Unfortunately, the majority of breaches remain undetected for weeks or months, allowing hackers to exploit an organization for an extended...

Read More

22 Feb How to shield online business from cyber attacks?

Posted at 11:50h in Business, How To, Security by Mon-K Team 0 Comments
4 Likes

Nowadays Internet security is particularly important for both business and customer. Every consumer should distinguish whether a site is secured before revealing the confidential information, while every online business owner should implement the preventive security measures in order to keep the sensitive information safe. In addition,...

Read More

18 Feb BlockChain and BitCoin: scams or new trends to follow?

Posted at 12:46h in Consumer, Cryptocurrency by Paolo Ferrari 0 Comments
2 Likes

BlockChain and BitCoin are almost unknown terms with regard to a technology that cab be defined as "disruptive" (volatile, radical, that explodes on the market, overturning the life of consumers from one day to the next, while sending its predecessors into oblivion). Let's try to...

Read More

23 Jan Cyber attacks: why you need to know about Meltdown and Spectre

Posted at 10:28h in Business, Consumer, Security by Flavia Piantino Gazzano 0 Comments
3 Likes

Meltdown and Spectre are hardware vulnerabilities that allow programs to steal data on the computer. The flow is in the CPU architecture and that's mean Meltdown and Specre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might...

Read More
Get our latest news!
Useful links
  • Press Area
  • Blog
  • Contact Us
Read our Latest Posts
  • 9 Steps Before Buying CryptoCurrencies

    ...

    24 August, 2018
  • Insider Threats: An Enemy Within

    ...

    10 August, 2018
  • Ransomware: What You Need to Know

    ...

    28 July, 2018

Mon-K Data Protection Srl.
P.IVA: IT09625500963 – all rights reserved ©2018

  • Privacy
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.

Necessary Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.