
Gartner’s top strategic technology trends for 2021
What will happen in technology in 2021? Gartner’s analysts have taken a look at the market and highlighted the biggest trends for the year.
What will happen in technology in 2021? Gartner’s analysts have taken a look at the market and highlighted the biggest trends for the year.
Running a good password cracking machine is both time-consuming and expensive, and for this reason, cyber criminals will always look for the path of least resistance. That is why you need to know how to create strong passwords, how to use a password manager, and learn how two-factor authentication (2FA) works.
Financial cybercrime can affect companies of all sizes and in all sectors – as well as private individuals – and can have dramatic consequences. But what are the types of attacks motivated by financial gains and how can we prevent these attacks from succeeding?
The cyber threat landscape is transforming and we need to stay alert and focused to not become victims of fraudulent attempts and scams–especially now that many of us are working from home. But how do we keep our devices and Internet connection secure from cybercrime when working remotely?
Social engineering (social manipulation) is one of the most widespread cybersecurity attacks. But what is it and how can your business, or even you as an employee, prevent such attacks from succeeding–or prevent them from happening altogether?
For the third year in a row, we in Visma will take part in the European Cybersecurity Month (ECSM)–the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organisations.
According to this year’s Hidden Statistics report carried out by The Norwegian Business and Industry Security Council (NSR), 59% of the companies that have been victimised of cyberattacks in 2019 identified the incident by chance and not as a result of well-established routines, policies and security frameworks. Here are some of the key findings from the report.
In software products and services, there is always a risk of bugs and vulnerabilities. Through our Bug Bounty program, we and our partner companies invite ethical hackers to help us find these vulnerabilities, so that they can be fixed faster.
Password hackers have access to better password hacking software and tools and passwords are stolen more than ever before. So how do you stay secure?
We believe it is important to make sure that all the work we do is in line with leading international privacy regulations. Visma is pleased to offer our customers one of the first audit assurance reports; the ISAE 300 type I, issued on June 16th 2020, made for compliance towards GDPR, in this case for the Visma EasyCruit product!
The power of getting your voice heard, and the knowledge that what you say, actually matters, is what has brought success into Visma’s’ security program. We are proud to share how Visma managed to embed security into the software development teams’ culture, and thereafter, successfully increase security.
As the world faces uncertainty in the current situation, there is one group seizing the moment: digital scoundrels. But how do they operate and what kind of cyber attacks can we anticipate during these times?
Human errors performed by employees pose a real security threat to the corporation they work in. Here are 3 common ways employees pose a threat – and what you as an employee must be aware of.
What methods do fraudsters use and what can be expected from us as employees and citizens to protect ourselves from fraud?Here are seven things you should know about cyber hygiene.
Did you know that a printer or outdated device connected to your network can be an entry into your systems for cybercriminals? As more and more devices are connected to the Internet, the chance of a digital attack happening also increases. We’ve had a chat with the Operations and Security Manager at Visma about this.
Even if you are a sunglass salesman, some types of clouds can be good for your business. When talking about cloud technology and cloud services, the word ‘cloud’ is essentially just a metaphor for the Internet. Instead of using the hard drive on your computer, the Internet is used to access data and applications. One of the […]