Security

Hacker attacks or data theft are popular topics since many years. How to protect yourself from hackers? Can I secure my data online?

To make sure your data has not been stolen or to prevent online theft, you can protect yourself in a few simple ways.

The first way to keep your network safe is continuous attention. If we naively believe that we have won a smartphone or that a transfer of several million from a distant relative from Africa is waiting for us, our data will probably be stolen sooner or later.

That is why we always check if the e-mail address has any suspicious typos or if we are sure that the current messages from our bank were being send to us from this account.

Make sure you always use secure https connections! Especially when you log into your banking. A green padlock next to the address means that the site is secure and you can use it without worry.

An important element of cybersecurity is to install anti-virus on the computer and anti-virus on the phone. Many of us forget about the anti-virus protection of our smartphone, even though it is almost always connected to the Internet!

With these three simple steps, you are already able to incredibly limit the likelihood of cyber attack on your equipment. Remember to be vigilant and not be guided by habits like automatic e-mail receiving and downloading attachments, or mindless clicking on links that you got in your communicator from friends!

Monthly updates and taking care of Security

Our monthly packages include audits and monthly updates to increase the security of our clients’ corporate data.

Removing the effects of attacks and restoring action

We clean servers after cybercriminals’ attacks and restore the affected sites to normal operation. We advise and introduce additional safeguards to eliminate the likelihood of possible attacks.

We carry out penetration tests (pentesting) of websites

Pentests take place through a remote connection to the client’s computer.

  • Scanning the network using wireshark, checking if no one is connected to it
  • Nmap - scanning ports through which potential attacks can occur
  • Update of all drivers and applications to reduce the risk of attack
  • System scan
  • System cleaning