Explore the world of IT with Safe-Connect's blog overview!

Phishingsimulatie op een ethische manier

Home » Blog overviewLast Updated on April 7, 2025 Phishing simulations have a bad reputation among some organisations. Not because they wouldn’t …

Cybersecurity en GDPR (1)

Home » Blog overviewLast Updated on April 2, 2025 Cybersecurity and GDPR are often seen as two separate worlds. On one side: …

The Pig Butchering scam

Home » Blog overviewLast Updated on February 13, 2025 Shady characters online pull off countless tricks to trap unsuspecting victims. One of …

European Ai Act

The European AI Act

Home » Blog overviewLast Updated on February 13, 2025 Time for a new chapter in AI regulation. After GDPR, the DMA and …

Paswoord reset cyberaanval

Home » Blog overviewLast Updated on February 17, 2025 Cybercriminals are constantly searching for new ways to target their victims. A recent …

Jouw brein vs Phishing

Your brain vs. phishing

Home » Blog overviewLast Updated on January 17, 2025 Phishing is a term that unfortunately needs little introduction these days. Yet cybercriminals …

Microsoft Teams SIP Intercom

Home » Blog overviewLast Updated on March 18, 2025 Find out how we did it Connecting a smart door intercom to Microsoft …

NIS2 banner

Home » Blog overviewLast Updated on May 14, 2025 Cyber threats are a reality that every organization faces today. With the introduction …

NIS2 banner

Home » Blog overviewLast Updated on February 17, 2025 Do you think your organisation is exempt from the NIS2 directive? You may …

Cyber Resilience Act

Home » Blog overviewLast Updated on December 3, 2024 Smart devices, software, robot vacuums. These technologies make life easier, perhaps too easy. …

Microsoft trustworthy AI

Home » Blog overviewLast Updated on October 4, 2024 Artificial intelligence (AI) is no longer just a thing of the future. It …

Ai cybersecurity

Home » Blog overviewLast Updated on September 19, 2024 We all make mistakes from time to time. Maybe you accidentally click on …

Windows 98 virus example

Home » Blog overviewLast Updated on July 18, 2024 The first concepts of self-replicating software In 1949, Hungarian scientist and mathematician John …

Copilot 365 virtual colleague

Home » Blog overviewLast Updated on July 3, 2024 Ready to make your working day easier and more enjoyable with Microsoft 365 …

Home » Blog overviewLast Updated on April 18, 2024 ChatGPT and other generative ai tools are capable of quickly generating texts and …

Reverse Prompt Engineering ENG

Home » Blog overviewLast Updated on March 27, 2024 Useful Ai tools have become a part of our lives. They help us …

Cybersecurity Reporting transparency in digital danger

Home » Blog overviewLast Updated on March 21, 2024 Cyber threats are constantly evolving. Incident reporting is an essential part of an …

BadGPT

Home » Blog overviewLast Updated on March 20, 2024 In the ongoing evolution of technology, AI models such as ChatGPT are a …

Cybersecurity gelaagde beveiliging

Home » Blog overviewLast Updated on March 18, 2024 Nowadays, online security is really a thing. You often hear about hacks, data …

Layered cybersecurity for your organisation

Home » Blog overviewLast Updated on March 4, 2024 Cybersecurity is one of the biggest challenges for organisations in the 21st century. …

NIS2 guideline as a benefit to your organisation

Home » Blog overviewLast Updated on April 25, 2024 The NIS2 Guideline is a new European legislation that aims to improve cybersecurity …

Vertrouwensprobleem digitale tijdperk

Home » Blog overviewLast Updated on February 8, 2024 In the age of digitalisation and technological advancement, the fight against cybercrime has …

bitwarden safe-connect

Home » Blog overviewLast Updated on February 2, 2024 Businesses and users log in daily to access information and programs. We constantly …

Bing Chat en DALL-E3: verander je smartphone in een handige Ai-assistent

Home » Blog overviewLast Updated on December 19, 2023 The end of 2023 is in sight. In recent months, we saw a …

Home » Blog overviewLast Updated on December 14, 2023 Writing effective prompts for AI tools such as Bing Chat and ChatGPT is …

Microsoft Ai Stack

The Microsoft Ai Stack

Home » Blog overviewLast Updated on December 11, 2023 Microsoft is taking the lead in making Artificial Intelligence (AI) accessible to a …

Microsoft Copilots overzicht

Home » Blog overviewLast Updated on March 14, 2024 Microsoft’s AI train is gaining momentum. And to top it off, Microsoft Ignite …

Home » Blog overviewLast Updated on November 30, 2023 Bing Chat was born in Microsoft Edge in February 2023, and its birth …

An overview of different types of Phishing

Home » Blog overviewLast Updated on September 27, 2023 Phishing remains one of the most dangerous forms of cyber attacks for your …

Vishing don't get hooked during a call!

Home » Blog overviewLast Updated on September 22, 2023 Phishing remains popular and comes in all shapes and sizes. Vishing, or Voice …

What is Lockbit and how do you protect your organization

Home » Blog overviewLast Updated on September 18, 2023 In the world of cyber threats, it is important to be well-informed about …

The essentials of Zero Trust for your organization

Home » Blog overviewLast Updated on September 14, 2023 In an era where cyber threats are constantly evolving, it is essential to …

Phishingmails herkennen

Home » Blog overviewLast Updated on September 27, 2023 Phishing continues to be a prominent cyber attack. More and more people are …

Why is the NIS2 directive so important

Home » Blog overviewLast Updated on January 24, 2024 Are you familiar with the new NIS2 yet? It is the successor to …

Home » Blog overviewLast Updated on February 13, 2024 As an organization, small or large, you increasingly find yourself in the sights …

Benefits Public Cloud

Home » Blog overviewLast Updated on August 4, 2023 Public Cloud, a term that has been gaining traction in recent years. That’s …

Managed local computers or Virtual Desktops, which solution fits your organisation

Home » Blog overviewLast Updated on August 4, 2023 Collaborate securely across devices in multiple locations. Is your way of working digitally …

Virtual Desktop a flexible and secure work environment

Home » Blog overviewLast Updated on August 4, 2023 Working safely and productively both in the office and remotely? You can! In …

Windows 365 Cloud PC vs Azure Virtual Desktop ENG

Home » Blog overviewLast Updated on March 31, 2023 Are you looking for a virtual workplace solution for your employees? Virtual Desktops …

The impact of 5G on Cybersecurity

Home » Blog overviewLast Updated on August 4, 2023 The rollout of 5G networks is driving significant changes in the way we …

Most common mistakes in Cybersecurity Assessments

Home » Blog overviewLast Updated on March 15, 2023 A cybersecurity assessment is an important tool for identifying vulnerabilities and improving the …

Zero-Day Attacks Understanding the Hidden Threat

Home » Blog overviewLast Updated on August 4, 2023 Is your organisation ready for digital danger? A zero-day attack or zero-hour threat …

Cyber insurances become unaffordable

Home » Blog overviewLast Updated on August 4, 2023 In the event of a cyberattack, are you sure you can recover your …

5 tips to prepare for a Cybersecurity Assessment

Home » Blog overviewLast Updated on March 15, 2023 Are you ready for your Cybersecurity Assessment? In this blog, you’ll discover 5 …

The importance of risk analysis for your Cybersecurity

Home » Blog overviewLast Updated on November 5, 2024 In the digital age, cybersecurity is a critical concern for individuals, businesses and …

Cyber assessment or audit

Home » Blog overviewLast Updated on August 4, 2023 A cybersecurity audit and a cybersecurity assessment are two tools used to evaluate …

Outsourcing your Cybersecurity

Home » Blog overviewLast Updated on August 4, 2023 Outsourcing cybersecurity can bring many benefits to your business. In this blog, you’ll …

PLC Security

Home » Blog overviewLast Updated on March 15, 2023 Programmable Logic Controllers (PLCs) are computer-based systems that are used to control industrial …

Cloud servers vs on-premise servers

Home » Blog overviewLast Updated on March 15, 2023 Talk about a hot topic! With energy prices increasingly in the spotlight, organizations …

Cyber Security Assessment Tool for IT infrastructures

Home » Blog overviewLast Updated on August 9, 2023 Cybercrime is now also causing a stir in cities and municipalities. Antwerp and …

microsoft secure score

Home » Blog overviewLast Updated on August 4, 2023 Cybersecurity is indispensable for businesses. Attack strategies are constantly evolving so being up-to-date …

Basic security

Home » Blog overviewLast Updated on March 15, 2023 Strong basic security is a regulatory requirement. That starts with digital hygiene training …

USB C Standard

Home » Blog overviewLast Updated on August 4, 2023 Say goodbye to a plethora of cables USB C will become the standard …

The Azure Monitor

Home » Blog overviewLast Updated on August 4, 2023 With Microsoft Azure, we monitor part of your IT infrastructure. This results in …

Zero Day Attack

Home » Blog overviewLast Updated on August 4, 2023 The security software that turned out to be unsecure for 10 years. Avast …

Home » Blog overviewLast Updated on August 4, 2023 Are you enjoying strong passwords with Bitwarden yet? The trusted password manager has …

Bug Bounties Safe-Connect

Home » Blog overviewLast Updated on August 4, 2023 Tech companies and Open Source projects aim for the highest level of security. …

Bitwarden paswoordloos

Home » Blog overviewLast Updated on August 4, 2023 We are working more and more in a digital environment. This is accompanied …

Azure Virtual Desktop Movex

Home » Blog overviewLast Updated on May 30, 2024 The 5 biggest advantages of connecting a legacy system like AS400 to Azure …

MFA prompt proces

Home » Blog overviewLast Updated on May 30, 2024 As a company, it is important to set up proper security in Microsoft …

DDoS attack

Home » Blog overviewLast Updated on August 4, 2023 In November 2021, the Azure DDoS protection platform managed to deflect an attack …

The attack on SolarWinds

Home » Blog overviewLast Updated on August 4, 2023 A disturbing trend in recent years has been the increase in cybercrime. Previously, …

End-to-end encryption

Home » Blog overviewLast Updated on May 30, 2024 You’ve probably heard of End-to-end Encryption before. Especially if you use Whatsapp regularly. …

QR-code

Home » Blog overviewLast Updated on August 4, 2023 The black and white code that experienced its growth during the pandemic; is …

Microsoft 365

Home » Blog overviewLast Updated on May 16, 2024 Microsoft offers several licenses aimed at businesses and organizations. Plenty of choice! But …

What is Smishing

Home » Blog overviewLast Updated on September 27, 2023 Users are increasingly exposed to cybercrime. Phishing is the most popular method of …

Outlook webmail

Home » Blog overviewLast Updated on March 15, 2023 Do you also get flooded with emails in the Outlook Web App every …

air quality monitor

Home » Blog overviewLast Updated on August 4, 2023 At Safe-Connect, we recognized the importance of good air quality in office spaces. …

Log4j

Home » Blog overviewLast Updated on August 4, 2023 What is Log4j and are you affected? There is a major security risk …

dark mode

Home » Blog overviewLast Updated on August 4, 2023 The digitization created new ways of working. Although it offers many advantages, there …

Microsoft Business Premium

Home » Blog overviewLast Updated on May 30, 2024 Combining cybersecurity and productivity doesn’t have to be a barrier for your organization. …

Home » Blog overviewLast Updated on May 30, 2024 Multifactor authentication is necessary to protect us in a digital environment. You can …

log in without entering a password

Home » Blog overviewLast Updated on May 30, 2024 Our platforms or devices that we use on a daily basis, have many …

Multi-factor authentication

Home » Blog overviewLast Updated on May 29, 2024 In order to work with different programs or websites, we first need to …

Home » Blog overviewLast Updated on March 15, 2023 It’s time for Windows 11! Without a doubt, you’ve heard about it. The …

The Hafnium Hack

The Hafnium Hack

Home » Blog overviewLast Updated on May 30, 2024 Alarming news in the world of cybersecurity. Vulnerabilities in Microsoft Exchange servers allowed …

Training cybersecurity

Home » Blog overviewLast Updated on May 30, 2024 It’s becoming increasingly more common. Data breaches, companies being hacked and important information …

The PolyX50

We are increasingly using software such as Teams or Zoom to organise meetings. This is certainly no surprise in a digital Covid era. Video conferencing is becoming increasingly more common. Unfortunately, it can sometimes be difficult to appear professional when the audio and video quality is not optimal. Does this sometimes bother you during important meetings? Fortunately, there is a solution that offers very good video and audio performance and also eliminates cable clutter. At Cats & Dogs, we put it to the test and tested the PolyX50.

Microsoft Teams

Home » Blog overviewLast Updated on May 30, 2024 Telephony in Teams, is it possible? Microsoft Teams offers usability and many features …

GDPR

Home » Blog overviewLast Updated on August 4, 2023 On the 25th of May 2018, GDPR became law. Yes, that’s almost 2 …

FIRST-LEGO League

Home » Blog overviewLast Updated on March 15, 2023 The FIRST® LEGO® League is a robot competition for youths aged 11 to 14. The competition …