Logo Logo Logo Logo Logo
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Cyber Risk Insurance
    • Phishing as a Service
    • Hacker Alert
    • Pentest Subscription
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
    • Working at Guardian360
  • Become a Partner
  • Dutch
  • German
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Cyber Risk Insurance
    • Phishing as a Service
    • Hacker Alert
    • Pentest Subscription
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
    • Working at Guardian360
  • Become a Partner
  • Dutch
  • German

21 Dec 7 cyber security predictions for 2018

Posted at 07:32h in Blog by Jan Martijn Broekhof 0 Comments
10 Likes
Share

Let’s face it: 2017 was a terrible year for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Will 2018 be better? Given what’s happened in 2017 — the Equifax breach, state-sponsored attacks, Russian manipulation of social media, Wannacry, and more phishing...

Read More

16 Dec 74% of CISOs say cybersecurity hinders productivity & innovation

Posted at 16:12h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

The need for comprehensive cybersecurity is ever increasing with the rise of malicious cybercrime – but it’s coming at a cost. Bromium released the findings of an independent survey conducted by Vanson Bourne of 500 CISOs from large enterprises in the US (200), UK (200) and...

Read More

07 Nov Cybersecurity is (not only) about Technology

Posted at 07:53h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

One of the biggest misconceptions is thinking cybersecurity is only about technology. When in fact, people and their behaviors, play a prominent role in almost every aspect of protecting digital assets. Without proper consideration for the human element, security strategies are destined to fail miserably. In...

Read More

31 Oct 5 ways to do 15 minutes of cybersecurity without a computer

Posted at 06:34h in Blog by Jan Martijn Broekhof 0 Comments
11 Likes
Share

If there’s one cybersecurity practice that absolutely everybody can do, that absolutely everybody should do, that should be as much a part of your day as brushing your teeth, making the first cup of coffee and correcting people who are wrong on Reddit, it’s this: Keep your software...

Read More

24 Oct 5 best practices in cybersecurity for businesses

Posted at 07:03h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

2017 was the year when cyber attacks finally became front-page fodder for Indian news media. It is little surprise that this coincided with the country becoming the second largest smartphone market. The lure of India for cybercriminals has never been as high and with the government embarking...

Read More

17 Oct Fear Not: You, Too, Are a Cybercrime Victim!

Posted at 07:08h in Blog by Jan Martijn Broekhof 0 Comments
5 Likes
Share

Maybe you’ve been feeling left out because you weren’t among the lucky few hundred million or billion who had their personal information stolen in either the Equifax or Yahoo!breaches. Well buck up, camper: Both companies took steps to make you feel better today. Yahoo! announced that, our bad!: It...

Read More

10 Oct 6 Best Practices that Reduce Third-Party Cybersecurity Risk

Posted at 07:45h in Blog by Jan Martijn Broekhof 0 Comments
5 Likes
Share

Cybersecurity threats are increasingly sophisticated and targeted. Hackers who want your information or want to disrupt your operations are looking for any way into your network. In an interconnected world, these hackers are increasingly looking to an organization’s supply chain partners, especially those with network...

Read More

03 Oct Is It Time to Step Up Your Managed Security Services Game?

Posted at 08:34h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

Most MSPs are missing out on advanced security revenue areas line incident response and remediation, SIEM, secure web access & more. End users of all sizes are faced with a myriad of digital threats that can cause problems ranging from business disruption to reputation damage —...

Read More

26 Sep More data lost or stolen in first half of 2017 than the whole of last year

Posted at 07:06h in Blog by Jan Martijn Broekhof 0 Comments
9 Likes
Share

More data records were leaked or stolen by miscreants during the first half of 2017 (1.9 billion) than all of 2016 (1.37 billion). Digital security company Gemalto's Breach Level Index (PDF), published Wednesday, found that an average of 10.4 million records are exposed or swiped every day. During the...

Read More

19 Sep #6 Reasons for Entrepreneurs to Invest in Security

Posted at 07:38h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

Growth in digital channels and transactions has exponentially increased chances of security threats over the last decade. The recent security threats, WannaCry and Petya, quickly became major concerns for businesses globally. According to a recent report by Kaspersky, Petya affected over 2,000 organizations globally. Unlike WannaCry, which...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9


Visiting address
Orteliuslaan 1000
3528 BD  Utrecht

Schouwburgplein 30-34
3012 CL Rotterdam
The Netherlands

Mailing address
P.O. box 2655
NL3000 CR Rotterdam
The Netherlands

Tel. +31 88 225 15 00

Find a Guardian360 partner

Guardian360 offers you services through selected partners.

Would you like contact with a partner? Find a partner.

Downloads, White papers and Demo

› Request a pilot

› Scan your website

› Download Guardian360 App

› Download whitepaper

Search

© Copyright Guardian360 | General Terms and Conditions | Privacy and cookiepolicy | Coordinated Vulnerability Disclosure