online security

Enclaive logo

Confidential Computing – enclaive

As our lives move into the cloud, protecting our information becomes vital. This is especially evident in projects where people collaborate to use vasts amount of confidential data for business. Data, however, needs to be undoubtedly protected and each handler along the value chain needs to be trustworthy with that data. Since people can step …

Confidential Computing – enclaive Read More »

Forced digitization

If you are reading this, you are probably couped up in your home, apartment, or wherever you have been forced to settle for a couple of months. Local stores ran out of toilet paper, rice, and other ‘essential’ supplies but what also flew off shelves were laptops, printers, webcams, and modems. Let’s not mention the …

Forced digitization Read More »

The Online Threats of 2019

How you can stop them from happening. Like a biological virus mutates – as technology advances so do the complexity of phishing and identity theft schemes. With major services adopting cloud technologies and storing private data online, anyone is vulnerable to hacking. To make matters worse, hackers continue to come up with some pretty creative …

The Online Threats of 2019 Read More »

Cloud-hosted services square up

Running your business requires choosing the right tools for you and your employees. In order to streamline work-related productivity, many organizations are migrating to cloud-based office suites. Specifically, Microsoft’s Office 365 and Google’s GSuite (now known as Google Workspace). Both products boast a variety of helpful productivity tools and the latest remote collaboration technologies. While …

Cloud-hosted services square up Read More »

This website uses cookies. By continuing to use this site, you accept our use of cookies.