News
News
READ THE LATEST NEWS

If we are discussing cyber security issues, we must admit that a safe child is a safe parent. If you take proper care of your children’s digital safety, you will avoid the risk of data theft, hacking attacks, data [...]

Holiday cybersecurity with NaviRisk cyber guide
Here are some tips from our cyber risk experts. Read on to enjoy a safe vacation! We are excited to search for the perfect vacation, trying to provide ourselves and our loved ones with a beautiful time and [...]

Phishing Awareness Training – Simulating Phishing Attacks
Phishing training for employees is one of the most effective ways to strengthen your company’s defences against malware, ransomware, data loss and Business E-mail Compromise (BEC) attacks. Experience shows that awareness campaigns result in a significantly reduced click-through rate after [...]
Our experts in media
LIST OF OUR PUBLICATIONS

Forbes
Technology, the development of which is intended to help humanity, is also used for evil purposes. More and more often, artificial intelligence becomes an ally of criminals, which helps them manipulate information, distort reality or blackmail. Business is often the victim.

Polish business is evacuating from Ukraine. Former soldiers of GROM special unit are helping.
Forbes
About the situation in Ukraine in the second day of the war, its chances in the clash with Russia, the courage, but also terror of the Ukrainians, about former soldiers of the special units “Grom” evacuating personnel from Polish companies, and about Putin’s aggression, to which the West will not respond with the same strength.

Companies are eager to invest in artificial intelligence. ChatGPT is an opportunity and a threat
wnp.pl
AI systems need access to large amounts of data to train and improve their algorithms. Often this is confidential company information, used to make their work easier. To guard against such risks, companies should bet on employee education and training.
Blog
LIST OF ARTICLES

Device Security: Best Practices for Phones
Threat actors increasingly target mobile devices to steal people’s credentials, gain access to corporate networks, or simply spy on victims’ activity. To help you maintain your device’s security, the expert recommends following these best practices: Create a strong lock-screen pin or password (at least six digits) and set your phone to lock automatically after 5 […]

Asked why he’d robbed banks, a notorious American gangster from the Great Depression era famously replied: ‘If they kept money in candy stores, I would rob candy stores.’ Is there any connection between old-style robbers and the plight of modern l law firms? On the surface, not really. After all, what can you steal from […]

Phishing – how to deal with it?
Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries […]