Blogs.

Read our blogs for the latest cyber security updates.
Microsoft Attack Simulation Eye Security person finding vulnerability

How Microsoft might have lured unsuspecting end-users into the hands of criminals

...

Eliminating cyber risk for your clients together

Businesses built on partnership In the relatively short time we’ve been in...

A case of ransomware, resolved

...

Logistics cybersecurity in 2024: Hello new growth! Hello new risks...

Sustainability. Growth. Digitalisation. These are the words everyone's using...

featured-image

The silent crisis: IT burnout due to increased cybercrime

Employee absenteeism is rising among IT managers and employees, as are burnout...

featured-image

NIS2: how will it be transposed in European countries?

The NIS2 Directive is the latest European cybersecurity regulation, aiming to...

European Union working on new security directive

The impact of the new 'cybersecurity' directive, NIS2, on insurers Although the...

featured-image

Who is responsible for the damage in a cyber attack?

In 2021, the Central Netherlands court made a striking decision. Bol.com and...

featured-image

When the data doctor makes you ill (but we decrypt his ransomware)

What happened? Recently, we were contacted by Aon Nederland Cyber Solutions,...

Are you ready to get started?

See how affordable complete protection can be for you