Office-resources-banner

Wi-Fi 6 Explained

Wi-Fi 6 Explained

Wi-Fi 6 is the next generation of the Wi-Fi standard, also known as 8002.11ax

Wireless technology is constantly evolving, our world environment is driven by more devices, more connections, and bandwidth-hungry applications. The networks already need more wireless capacity and reliability. In this context, Wi-Fi 6 comes in to supply all its demands and provide a better experience to the users.

Thursday, May 2, 2019/Author: Suellen Machado/Number of views (307)/Comments (0)/ Article rating: 5.0
Blockchain explained and its Terminology

Blockchain explained and its Terminology

Blockchain is getting more attention in 2018. If you need to know more about it, check out our article below

When it comes to Cybersecurity, blockchain might be one of the trendiest topics in 2018, it’s everywhere and it’s usually surrounded by loads of questions. Most of people might think that is all related to cryptocurrency, but in fact is much more than that. In this article we will try to clarify what is Blockchain and the main terminology you need to know, even though isn’t part of your daily routine.

Monday, September 3, 2018/Author: Suellen Machado/Number of views (479)/Comments (0)/ Article rating: No rating
Ransomware, what is that?

Ransomware, what is that?

Have you been locked out of your own files?

Ransomware is a piece of malicious software that can encrypt files on your computer, meaning you can no longer access them. Commonly you will just get a popup warning telling you are files are locked and here is how much you need to pay to get them unlocked. This is a Trojan attack which would usually come in the form of an email attachment or file.

Tuesday, November 17, 2015/Author: Liam Phelan/Number of views (2178)/Comments (0)/ Article rating: 5.0
So What Is Penetration Testing

So What Is Penetration Testing

What you need to know

So you are concerned about protecting your company’s data and are wondering what to do next. Well getting certified in Certified Ethical Hacker Program (CEH) will give you the skills needed to keep up to date with the latest methods of Ethical Hacking and Security Assessment.

Friday, November 13, 2015/Author: Liam Phelan/Number of views (2043)/Comments (0)/ Article rating: 4.3
Categories: Cybersecurity
RSS

Categories

Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.

Subscribe