
What is ransomware and how does it work?
Ransomware attacks have been on the rise. If you’re not familiar with this type of virus, it’s time to read up on it to protect your data.
Ransomware attacks have been on the rise. If you’re not familiar with this type of virus, it’s time to read up on it to protect your data.
2021 was a year of both continuity and change. Covid remains a burden on the global economy and organisations are looking for cloud solutions to help them stay productive from any location. We also saw new trends, from rising expectations among jobseekers in the talent market, to rapidly growing cybercrime. Learn more about these trends and find out how Visma is addressing them.
Cyber security has traditionally been viewed as a male-oriented industry but has had an increase in women in recent years. Meet Daniela, our Lead Security Researcher who recently received two “Women in tech” awards, and learn more about her work and how she got into the field of cyber security.
Did you know that the right to privacy in the digital world is a human right? Still, many people lack knowledge about how their personal data is being collected, used, and shared. That is the focus of the Data Protection Day that takes place on January 28th.
Every year we spend millions on Christmas gift shopping online. The Holiday season is also the peak for cyber crime. What are the most common scams during the Holidays and how can we avoid falling victim to these scams?
Starting from the famous video game Minecraft and not ending with your smart toaster, a new vulnerability was discovered last Thursday that potentially affects millions of Internet users. Learn more about Log4Shell and whether or not it affects your business.
Financial cybercrime can affect companies of all sizes and in all sectors – as well as private individuals – and can have dramatic consequences. But what are the types of attacks motivated by financial gains and how can we prevent these attacks from succeeding?
Human errors performed by employees pose a real security threat to the corporation they work in. Here are 3 common ways employees pose a threat – and what you as an employee must be aware of.
Running a good password cracking machine is both time-consuming and expensive, and for this reason, cyber criminals will always look for the path of least resistance. That is why you need to know how to create strong passwords, how to use a password manager, and learn how two-factor authentication (2FA) works.
What is fake news and why has fake news become such a large industry? We dig deeper into the different types of fake news and how it can be used to interfere in elections, economies, and geopolitical conflicts.
We are taking part in the European Cybersecurity Month (ECSM) for the fourth year in a row. Read more about the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations, and why we are participating.
How secure are cloud solutions? What initiatives are cloud providers taking to make sure the data on their servers are secure? And what are the most important cloud security challenges today? We have asked one of the security experts at Visma, Stian Estil, to answer these questions.
“It’s a bit like insurances. Perceived as an unnecessary expense, until the day chaos erupts. Then most people are well satisfied with the investment.” We have talked to Security Director at Visma, Espen Johansen, about cloud security.
Losing critical data can be devastating for a company. How can you make sure that your organisation’s data is secure, how should you set a solid backup strategy, and what are the advantages and disadvantages of storing your data on cloud servers versus on-premise servers?
Not all hackers are bad—in fact, ethical hackers can help companies strengthen their security measures. But how does bug bounty programs and responsible disclosure programs work, and what does the process of ethical hacking look like?
Every organisation—from startups to large, global corporations and nonprofits—must make sure that they have procedures to keep up with an ever-changing landscape of threats and vulnerabilities to keep its assets secure. But what is an IT Security Policy, and how do you enforce them?
People remain the weakest links in a business. By establishing a strong culture for cyber security, you lay the foundation for making your employees a strength rather than a risk–which leads to a decreased number of threats in the long run.
What will happen in technology in 2021? Gartner’s analysts have taken a look at the market and highlighted the biggest trends for the year.