Beware of Fortnite for Android

An effective antivirus helps to closely monitor your mobile devices, avoiding the action of malicious campaigns that take advantage of subjects of mass interest, common on the web.

What is IPv6 and why is it more secure?

Until full transition from IPv4 to IPv6, your security products will need to support both versions of the Internet Protocol.

Putting security basics into practice

Confidentiality, integrity and availability (CIA) are essential principles for an effective information security strategy. But how can you move from theory to practice?

Build barriers against DNS attacks

DNS (Domain Name System) servers makes our daily life much easier. But it can also hide great risks if you do not pay proper attention to security.

5 recommendations to prevent security incidents

To raise security in your company, it is crucial to take a few steps to help you create a strong security incident prevention culture.

How to backup securely

Backup is a recommended data protection technique for businesses and end users. But a secure backup requires more than just copying files to an external drive.

3 crucial resources for a safer mailbox

Protecting email boxes is a security information priority, for a reasonable reason: the attacker can take advantage of the corporate user's carelessness or lack of knowledge to steal access privileges,

Be alert to frequent types of phishing

Phishing is often associated with email, however there are some variations that use text messages or voice messages on phones.

The challenges of GDPR

European Union's General Data Protection Regulation (GDPR) will influence corporate mindset around the world to respect information security. To provide data privacy, it will be mandatory to view cybersecurity technology

Put up your defenses against botnets

Botnets can infect devices and use them to promote malicious activity such as DDoS attacks and distribute phishing. A multi-layered security strategy is the most efficient way to address this

Security on the internet

The internet is one of the great revolutions of the past decades and has changed the way people communicate and consume information. By 2022, 75% of the world's population will

Many ways to get BLOCKBIT


Start your experience in the best way, see our pre-configured products in the cloud with full visibility in real time


You can choose between Cloud or Virtual Appliances. Get to know our products before you buy


Purchase our products BLOCKBIT UTM, VCM & SMX. Get protected right away