The company’s information system is closely related to privileged access. With this access, the company’s information system is only accessible for specific users. Users who have [...]
As the name implies, the firewall functions within the company’s scope, which is “wall,” serves as a barrier. This barrier is created between the computer and the internet [...]
The overwhelming amount of news coverage surrounding the Covid-19 has created a new danger and risk. Cybercriminals are taking advantage of it. In Indonesia and other countries, the news about [...]
Measuring the cybersecurity strategy effectiveness is increasingly important as more cyberattacks hit businesses all the time and leaves businesses scrambling for the right solutions to secure [...]
In the previous article, we have explained about Ransomware as a Service and how it works. This article will focus on solutions and strategies for organizations to take preventive action against [...]
As an individual who actively seeks to make the Internet a part of our world, you must have been familiar with Ransomware attacks. Since its inception until now, Ransomware is still one of the [...]
Rapid adoption of digital transformation technologies such as IoT, SaaS applications, and BYOD in enterprise environment has made an increase in the number of network edges that need to be [...]
After knowing about Identity and Access Management (IAM) – the definition and how it works to boost company’s cyber security in the article: “What is Identity and Access Management? Definition [...]
Technological advances enable businesses to work more effectively in a number of different ways. Since technology creates the way for business to transform, we can say that business needs [...]
At the beginning of 2020, the Covid-19 has been recognized as a global pandemic. Since then, almost all companies have implemented working from home policies for their workers and utilize [...]