
What is 2FA (two-factor authentication)?
2FA is an extra layer of security used to verify your identification. It’s a smart way to protect your online accounts against cyber criminals.
2FA is an extra layer of security used to verify your identification. It’s a smart way to protect your online accounts against cyber criminals.
Do you use a couple of passwords in different variations? Maybe with “123” at the end? If yes, stop everything you’ve done up until now and get a password manager.
More and more women are working with cyber security in the software industry, and Visma is no exception. In the second part of this two-part series, get to know more of the talented women who are protecting Visma’s cloud software from cyber threats.
Cyber security is no longer a male-dominated industry. More and more women are entering this vital discipline that protects people and their data from cyber attackers. In part one of this two-part series, get to know some of the talented women working with cyber security at Visma.
Ransomware attacks have been on the rise. If you’re not familiar with this type of virus, it’s time to read up on it to protect your data.
2021 was a year of both continuity and change. Covid remains a burden on the global economy and organisations are looking for cloud solutions to help them stay productive from any location. We also saw new trends, from rising expectations among jobseekers in the talent market, to rapidly growing cybercrime. Learn more about these trends and find out how Visma is addressing them.
Cyber security has traditionally been viewed as a male-oriented industry but has had an increase in women in recent years. Meet Daniela, our Lead Security Researcher who recently received two “Women in tech” awards, and learn more about her work and how she got into the field of cyber security.
Did you know that the right to privacy in the digital world is a human right? Still, many people lack knowledge about how their personal data is being collected, used, and shared. That is the focus of the Data Protection Day that takes place on January 28th.
Every year we spend millions on Christmas gift shopping online. The Holiday season is also the peak for cyber crime. What are the most common scams during the Holidays and how can we avoid falling victim to these scams?
Starting from the famous video game Minecraft and not ending with your smart toaster, a new vulnerability was discovered last Thursday that potentially affects millions of Internet users. Learn more about Log4Shell and whether or not it affects your business.
Financial cybercrime can affect companies of all sizes and in all sectors – as well as private individuals – and can have dramatic consequences. But what are the types of attacks motivated by financial gains and how can we prevent these attacks from succeeding?
Human errors performed by employees pose a real security threat to the corporation they work in. Here are 3 common ways employees pose a threat – and what you as an employee must be aware of.
Running a good password cracking machine is both time-consuming and expensive, and for this reason, cyber criminals will always look for the path of least resistance. That is why you need to know how to create strong passwords, how to use a password manager, and learn how two-factor authentication (2FA) works.
We are taking part in the European Cybersecurity Month (ECSM) for the fourth year in a row. Read more about the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations, and why we are participating.
How secure are cloud solutions? What initiatives are cloud providers taking to make sure the data on their servers are secure? And what are the most important cloud security challenges today? We have asked one of the security experts at Visma, Stian Estil, to answer these questions.
“It’s a bit like insurances. Perceived as an unnecessary expense, until the day chaos erupts. Then most people are well satisfied with the investment.” We have talked to Security Director at Visma, Espen Johansen, about cloud security.
Losing critical data can be devastating for a company. How can you make sure that your organisation’s data is secure, how should you set a solid backup strategy, and what are the advantages and disadvantages of storing your data on cloud servers versus on-premise servers?
Not all hackers are bad—in fact, ethical hackers can help companies strengthen their security measures. But how does bug bounty programs and responsible disclosure programs work, and what does the process of ethical hacking look like?