Blog & Media

Read cybersecurity articles produced by Blockbit.

segurança no uso do WhatsApp

How businesses can increase security in using WhatsApp

We live in an era where quick answers is unquestionable. It is no coincidence that research shows that WhatsApp is the third most used social network in the world, with over 1.5 billion users – if we consider other instant messaging systems, we will see that no other type of

Read more

5G impacts on cybersecurity

Among the changes brought by technology, few innovations have been as striking to the lives of people and companies as the mobile Internet. Thanks to the mobile connection, we can access and manage the most diverse types of applications, sharing information at an impressive speed and simplifying the way we

Read more
How to mitigate insider threats

How to mitigate insider threats

Looking at the threats that are within the walls of your company is as important as looking out. According to a study conducted by Crowd Research Partners [1], insider threats are a major concern for information security managers. 90% of companies feel vulnerable to threats generated within their own environment.

Read more

You need centralized security management

Thousands of devices and applications used by corporate users generate an endless amount of data. However, mountains of data do not always provide valuable information. If you want to take the best from data, it is necessary to know what are your looking for. What type of information do you

Read more
IPS or IDS

IPS or IDS: what do you need?

Managing digital threats is a growing priority for all businesses. Private network defense systems use diverse techniques to identify and prevent violations and recognition activities in a private ecosystem. There are two types of system: Intrusion Detection (IDS) and Intrusion Prevention (IPS). They are quite similar, but each has their

Read more
dds ddos

DoS and DDoS: understand and protect your data

Denial of Service (DoS) attacks are designed to make a server unavailable by blocking the execution of tasks. They are more common to WEB servers, but with no delivery of malicious loads. In effect, they consist of directing a volume of access requests that are larger than the server is capable

Read more