Dear Valued Customers & Suppliers, We are excited to share important news regarding the evolution of our company and how this change will impact you. We are pleased to announce that on March 1, 2022, the business activity under the name PROXIMUS Radosław Janowski was transformed into Proximus Sp. z o.o. What does that mean […]
In the last ten years or so, securing our local area networks has become more difficult, thanks to ubiquitous high-speed broadband and a proliferation of internet-enabled devices. Some of these are branded ‘smart’ but their widespread adoption could be considered less so. Some, like smartphones, add convenience but most introduce security risks. Whether it’s at […]
Disclaimer: As there are books about document/data security, consider the following as an introduction. Discuss the points raised and estimate how your company would be rated if tested by an ethical hacker or penetration tester. Perhaps you might want to hire a penetration testing company to evaluate your digital and on-premise security? Digital transformation is […]
In most companies, at least those who believe in managing security correctly, the rollout of all updates is controlled by the IT team. Only users with administrative access can install security patches, firmware and software updates or service packs. Basic users are also blocked from installing software on company assets. This is good practice and […]
According to Lynne Truss, texting is a supremely secretive medium of communication that you should be careful about what you use it for. For your company, this should not be a daunting task. Well, you can use SMS alerts in different departments and functions. Remember, the success of organizational activities relies on the interlinking of […]