10 tips to avoid being scammed during holiday online shopping

The Christmass season is a time of joy, but it’s also a period of intense preparations, including shopping for gifts. More and more people turn to online shopping for convenience and time savings. Unfortunately, this season is also a prime opportunity for scammers who exploit our inattention and the pressure of holiday deadlines. So, how can you…

PowerShell – summary system report

I present to you a PowerShell script that uses can be useful for monitoring system resources and checking the current configuration. The script saves the data in a table and generates a diagnostic report, which is useful for administering larger environments or analyzing problems. This script does: CPU and RAM monitoring Analysis of free disk space. Verification…

Ideas for unique gifts related to cyber security – part 2

Another set of gift ideas for your Christmass shopping 1. SSD with built-in hardware encryption For whom? For individuals storing sensitive data, from business documents to family photos.Why? Drives like the Samsung T7 Touch, equipped with AES 256-bit encryption and a fingerprint reader, offer both fast access and enhanced security. 2. USB password generator For whom? For…

Ideas for unique gifts related to cyber security – part 1

Christmas is getting closer and closer, and if you want to surprise your loved ones with something unconventional, practical and…. secure, I've prepared a list of cyber security inspirations. These ideas are unusual, but sure to be appreciated by technology fans and privacy-minded individuals. 1. Hardware U2F/FIDO2 key - YubiKey For whom? For anyone who uses online…

How to use Microsoft Secure Score to assess Office 365 security?

Microsoft Secure Score is a tool developed by Microsoft and designed to help organizations assess and improve the level of security in the Office 365 environment. It is an indicator of the level of security of our tenant and can be considered as a guide that indicates the actions to be taken to improve security. What is…

How to check if a link is safe? Practical tips

Every day, we receive countless emails and browse many websites – this has become a norm. However, with this convenience also comes risk. Links can lead to malicious websites, viruses, or even phishing attempts. So, how can you check if a link you're about to click is safe? In this article, we'll discuss several practical steps to…

PowerShell – script for monitoring website availability

PowerShell – script for monitoring website availability
Sometimes we want to know the availability of web applications. To do this, we need a system that will query specific addresses at regular intervals. But what if such a system doesn't exist, and we need to verify it for testing purposes? I’ve prepared a short and simple script for such needs, which, given a list of…

What are penetration tests?

What are penetration tests?
The fact is that we are increasingly dependent on systems. The threats associated with cyberattacks are becoming more real. For both companies and public institutions, one of the key elements of data and IT system protection is penetration testing, also known as “pentests.” What lies behind this term, how does such a process work, and why is…

How to secure your IoT devices: 6 practical Steps

How to secure your IoT devices: 6 practical Steps
IoT (Internet of Things) devices bring incredible convenience and functionality, but they also come with risks since they are connected to the Internet, which opens the door to potential threats. To protect your data, privacy, and devices, it is essential to understand and implement the following steps that will help you secure your assets. 1. Change default…

Is a VPN in a company enough security?

Is a VPN in a company enough security?
In today's world, where cyber threats are becoming more complex and widespread, many companies have or are just deciding to implement a VPN as a key component of their security strategy. A VPN offers a number of benefits, such as encryption of data between a company and an employee or between company branches and anonymity on the…