Blogs.

How Microsoft might have lured unsuspecting end-users into the hands of criminals
...


$750K Ransomware Attack: Manufacturer's Recovery with Eye Security
Picture this: a state-of-the-art production floor plunges into chaos. Machines...

Top 5 Cyber Threats Manufacturers Face in 2025
Cyber attacks can be devastating to manufacturers. They disrupt supply chains,...


Manufacturing and Cybersecurity: What Are the Challenges?
Manufacturing companies form the very foundation of the global economy....


Eliminating cyber risk for your clients together
Businesses built on partnership In the relatively short time we’ve been in...


A case of ransomware, resolved
...


Logistics cybersecurity in 2024: Hello new growth! Hello new risks...
Sustainability. Growth. Digitalisation. These are the words everyone's using...


The silent crisis: IT burnout due to increased cybercrime
Employee absenteeism is rising among IT managers and employees, as are burnout...


NIS2: how will it be transposed in European countries?
The NIS2 Directive is the latest European cybersecurity regulation, aiming to...


European Union working on new security directive
The impact of the new 'cybersecurity' directive, NIS2, on insurers Although the...


Who is responsible for the damage in a cyber attack?
In 2021, the Central Netherlands court made a striking decision. Bol.com and...
