Datasecurity

Phishing

What is a phishing e-mail and how can you recognise it?

  • 23 June 2021
  • Reading time: 8 min

Cybercriminals increasingly make use of phishing e-mail because it is much easier to get people to click on a link than breaking into their computers.

How does Combell protect you against DDoS attacks?

  • 4 June 2021
  • Reading time: 3 min

DDoS attacks are becoming more frequent and more sophisticated. That is why it is essential to protect yourself against such attacks. Combell has developed a comprehensive strategy to make sure...

The Combell Shield: a collection of defence systems

  • 18 May 2021
  • Reading time: 6 min

Anyone who has ever read a newspaper is well aware that more and more criminals are prowling the Internet in an attempt to exploit vulnerable websites. That is why it...

DDoS - Protection

What is a DDoS attack, and how can I protect myself from it?

  • 12 May 2021
  • Reading time: 7 min

DDoS attacks can cause major economic damage and completely shut down websites. What is a DDoS attack? How can you protect your website against DDoS attacks and what measures does...

The impact of the employee on your cybersecurity

Cybersecurity: how can your employee actively help?    

  • 3 August 2020
  • Reading time: 4 min

While human capital is one of the most valuable trump cards of any business, at the same time those very same employees may create dangers when it comes to cybersecurity....

Tips to protect your company against hackers

5 tips to protect your company against hackers

  • 30 July 2020
  • Reading time: 5 min

As digital technologies evolve, hackers are enjoying more and more success. Nowadays, cybercriminals are using advanced methods to damage your company. A small mistake can have huge repercussions and, as...

Top 5 most commonly used cyberattacks

The 5 most common types of cyber attacks

  • 28 July 2020
  • Reading time: 4 min

Increasingly, companies are faced with cyber incidents - both small and medium-sized enterprises, and large organizations. What types of cyber attacks can endanger your business? Download the entire cybersecurity e-book...

SSL-certificates - shorter duration

Shorter duration for SSL certificates: a maximum of 1 year

  • 9 July 2020
  • Reading time: 3 min

To increase the security of HTTPS connections, SSL certificates will be for a shorter duration: from now on, they will have a maximum validity of 1 year. How does that...

KPD customer case Veeam offsite back-up

Off-site backup protects the customers of KPD Services from data loss

  • 16 June 2020
  • Reading time: 10 min

Backups, especially external backups, are clearly the best defence against cyberattacks. In the event that a hacker does manage to infiltrate your systems or even block them, an off-site backup...

Kanaal Z reportage Corilus

Corilus supports healthcare providers with new digital platform Helena

  • 20 April 2020
  • Reading time: 5 min

The coronavirus crisis provided the final impetus for the further digitalisation of healthcare. In these difficult times, Corilus, which has been an expert in software for the healthcare sector for...

Cloud Computing en de GDPR

Cloud Computing and GDPR: what you need to know

  • 2 March 2020
  • Reading time: 6 min

The data protection rules, laid down in the GDPR, also apply to data that you store in the cloud. And also via the many cloud computing services you use. What...

InTouch reportage Kanaal Z

InTouch digital mobility applications require high-performance IT infrastructure

  • 9 December 2019
  • Reading time: 3 min

Digital transformation is also on the rise in cities and municipalities. They are putting all their efforts into becoming 'smart cities', which are boosting their operational efficiency through the use...