DAGMA celebrates its 35th anniversary
Exactly 35 years ago, on June 30, 1987, an adventure began that continues to this day! Three friends, a few ideas, a handful of knowledge and a solid dose of enthusiasm – this was the recipe for building a brand that employs over 200 people today. At that time, DAGMA became, among others, a leader in providing digital security solutions, ensuring the protection of nearly 150,000 companies and institutions in Poland.
Increasing number of phishing campaigns. Cybercriminals target Internet users, businesses and organisations
According to the latest ESET Threat Report T1 2022, email threats increased by nearly 40% in the first four months of this year, compared to the last four months of 2021. Phishing campaigns are not limited only to Internet users, they concern governments, organisations and businesses as well. ESET Expert explains what affects the safety level.
Data leak-proof environment – how to get there?
Business and organisation data flows through official and unofficial channels, such as email, instant messaging, printers, and cloud solutions. If employees fail to treat the data reasonably and the company or institution fails to implement the appropriate solutions, they may easily lose it. Learn the 10 most important rules to prevent data leakage within your organisation.
Easy privileged access for employees and service providers
Hackers started working for unfriendly governments, which increased the refinement of their actions. Both the public and private sector are exposed to hostile activity.
Cyber-attack insurance – will it become popular in Poland?
Only last year, data breaches costed organisations USD 4M on average. 2021 was a record year in cyberattacks, which increased by 50% per week. Network and internal system downtimes have several consequences for companies, not only financial. Can you reduce the risk with cyber-insurance, which emerged on the Polish market recently?
How to successfully implement a DLP solution in a company in one hour?
Implementing DLP in a company does not have to be difficult, laborious and does not have to consume a lot of resources. Solutions are available on the market, the configuration of which should not be a major problem. Sticking to the scheme may allow us to protect our environment without much effort.
You don't control the work of your administrator as well?
IT network administrators ensure that enterprise employees can log in to their computers and company mail and use their company data without hindrance. Due to the administrators' broad powers and possibilities of interference in the IT infrastructure, the trend of using specialised tools to control the so-called privileged access is becoming increasingly popular.