Explore the world of IT with Safe-Connect's blog overview!

Are you familiar with the new NIS2 yet? It is the successor to the 2016 NIS1 directive, often referred to as the …

As an organization, small or large, you increasingly find yourself in the sights of a cybercriminal. That’s the harsh reality. They are …

Public Cloud, a term that has been gaining traction in recent years. That’s because, as an organization, you want to benefit from …

Collaborate securely across devices in multiple locations. Is your way of working digitally evolving as well? As an organization, you want to …

Working safely and productively both in the office and remotely? You can! In response to the growing need for flexible workplaces, Microsoft …

Are you looking for a virtual workplace solution for your employees? Virtual Desktops are in demand because you work in a secure …

The rollout of 5G networks is driving significant changes in the way we are connected and interact with technology. With higher speeds …

A cybersecurity assessment is an important tool for identifying vulnerabilities and improving the security of your IT systems and data. However, there …

Is your organisation ready for digital danger? A zero-day attack or zero-hour threat is a cyber attack in which the attacker exploits …

In the event of a cyberattack, are you sure you can recover your critical data? Many organizations are concerned and are looking …

Are you ready for your Cybersecurity Assessment? In this blog, you’ll discover 5 tips to properly prepare yourself. A cybersecurity assessment aims …

In the digital age, cybersecurity is a critical concern for individuals, businesses and governments around the world. One of the most important …

A cybersecurity audit and a cybersecurity assessment are two tools used to evaluate the security of a company’s online systems and data. …

Outsourcing cybersecurity can bring many benefits to your business. In this blog, you’ll discover the main reasons: Cost savings: Outsourcing cybersecurity eliminates …

Programmable Logic Controllers (PLCs) are computer-based systems that are used to control industrial processes, such as those in manufacturing, power plants, and …

Talk about a hot topic! With energy prices increasingly in the spotlight, organizations are raising a pressing question: What does the price …

Cybercrime is now also causing a stir in cities and municipalities. Antwerp and Diest are the latest victims. The implications are significant …

Cybersecurity is indispensable for businesses. Attack strategies are constantly evolving so being up-to-date is a must. It is often difficult to get …

Strong basic security is a regulatory requirement. That starts with digital hygiene training for your employees. This necessity has grown as cyber-attacks …

Say goodbye to a plethora of cables USB C will become the standard charging protocol for small- to medium-sized electronic devices starting …

With Microsoft Azure, we monitor part of your IT infrastructure. This results in a proactive management that protects your organization from digital …

The security software that turned out to be unsecure for 10 years. Avast and AVG are two antivirus programs commonly found on …

Are you enjoying strong passwords with Bitwarden yet? The trusted password manager has spent the last few years building a community that …

Tech companies and Open Source projects aim for the highest level of security. They do this by using so-called ‘Bug Bounties’. A …

We are working more and more in a digital environment. This is accompanied by more services, more applications and a plethora of …

The 5 biggest advantages of connecting a legacy system like AS400 to Azure Virtual Desktop: The AS400 system can be retained without …

As a company, it is important to set up proper security in Microsoft 365. Previously, we wrote a blog about what Multifactor …

In November 2021, the Azure DDoS protection platform managed to deflect an attack of 3.47 terabits per second. This protection protected the …

A disturbing trend in recent years has been the increase in cybercrime. Previously, we wrote a blog about the Hafnium hack. Unfortunately, …

You’ve probably heard of End-to-end Encryption before. Especially if you use Whatsapp regularly. Messages and calls are end-to-end encrypted so no one …

The black and white code that experienced its growth during the pandemic; is it safe? The digital acceleration sparked by the corona …

Microsoft offers several licenses aimed at businesses and organizations. Plenty of choice! But which one suits your company best? As a company …

Users are increasingly exposed to cybercrime. Phishing is the most popular method of stealing important data. This form of digital fraud has …

Find out how we did it Connecting a smart door intercom to Microsoft Teams. That sounds interesting! We at Safe-Connect agreed. We …

Do you also get flooded with emails in the Outlook Web App every day? Then you probably have a hard time cleaning …

At Safe-Connect, we recognized the importance of good air quality in office spaces. Covid-19 reinforced this need and with our Managed Services, …

What is Log4j and are you affected? There is a major security risk for businesses due to a serious vulnerability in Apache …

Is dark mode worth trying?

The digitization created new ways of working. Although it offers many advantages, there are also some disadvantages. One is the increase in …

Businesses and users log in daily to access information and programs. We constantly wonder if these logins are still good enough. Do …

Combining cybersecurity and productivity doesn’t have to be a barrier for your organization. Here’s how we do it. A major rise in …

Multifactor authentication is necessary to protect us in a digital environment. You can read more about that in our blog on the …

Our platforms or devices that we use on a daily basis, have many features in terms of security. You will see that …

In order to work with different programs or websites, we first need to log in. Our login credentials consist of a username …

It’s time for Windows 11! Without a doubt, you’ve heard about it. The brand new Windows 11. The 5th of October was …

The Hafnium Hack

Alarming news in the world of cybersecurity. Vulnerabilities in Microsoft Exchange servers allowed hackers to access a company’s servers, emails and calendars. …

It’s becoming increasingly more common. Data breaches, companies being hacked and important information being stolen. It is important as a company to …

The PolyX50

We are increasingly using software such as Teams or Zoom to organise meetings. This is certainly no surprise in a digital Covid era. Video conferencing is becoming increasingly more common. Unfortunately, it can sometimes be difficult to appear professional when the audio and video quality is not optimal. Does this sometimes bother you during important meetings? Fortunately, there is a solution that offers very good video and audio performance and also eliminates cable clutter. At Cats & Dogs, we put it to the test and tested the PolyX50.

Telephony in Teams, is it possible? Microsoft Teams offers usability and many features for countless businesses and organizations. We have been using …

On the 25th of May 2018, GDPR became law. Yes, that’s almost 2 years ago now. How time flies! Since I deal …

The FIRST® LEGO® League is a robot competition for youths aged 11 to 14. The competition is all about Research, Robotics and Core Values. Participants are …