CYBER SECURITY BEST PRACTICES

The basic principles that should guide those who are called upon to create a computer, information or industrial network, or to secure a pre-existing one, are the ZERO TRUST and the MICRO SEGMENTATION of the network regardless of its size.

The ZERO TRUST principle applies not only to the individuals in charge, at whatever level of security, but also and above all in the choice and use of the security equipment that will be used to protect the network.....


Read More

ABOUT THE PASSWORD MANAGER

By the end of 2021, 69% of the population would welcome the purchase of a password manager, even though one in five people would already be using it, according to Security.org.

If this is true, it's not hard to understand why so many cyber attacks are successful!

It is easy to understand the risk of such use when you know what a password manager is and how it works.


WHAT IS A PASSWORD MANAGER ?

.....


Read More

EASE v SAFETY

Although we are in different registers, we can say that just as the BEST is the enemy of GOOD, EASE is the enemy of SECURITY. Two different registers, in fact, since the search for BETTER is the fact of wanting to surpass oneself in the accomplishment of a task and/or in the goal sought, whereas EASE, an expression of laziness, is a destructive element of SAFETY.


Read More

Let’s Keep In Touch