Explore the world of IT with Safe-Connect's blog overview!

Home » Blog overviewNowadays, online security is really a thing. You often hear about hacks, data breaches, and viruses, right? So, how …

Home » Blog overviewCybersecurity is one of the biggest challenges for organisations in the 21st century. With the increase in cyber attacks, …

Home » Blog overviewThe NIS2 Guideline is a new European legislation that aims to improve cybersecurity for critical and important entities. It …

Home » Blog overviewIn the age of digitalisation and technological advancement, the fight against cybercrime has become a challenge of unprecedented magnitude. …

Home » Blog overviewBusinesses and users log in daily to access information and programs. We constantly wonder if these logins are still …

Home » Blog overviewThe end of 2023 is in sight. In recent months, we saw a lot of Ai developments along both …

Home » Blog overviewWriting effective prompts for AI tools such as Bing Chat and ChatGPT is a new skill that requires both …

The Microsoft Ai Stack

Home » Blog overviewMicrosoft is taking the lead in making Artificial Intelligence (AI) accessible to a wide audience. Helpful AI tools allow …

Home » Blog overviewMicrosoft’s AI train is gaining momentum. And to top it off, Microsoft Ignite 2023 is adding a touch of …

Home » Blog overviewBing Chat was born in Microsoft Edge in February 2023, and its birth was embraced by many. Users worldwide …

Home » Blog overviewPhishing remains one of the most dangerous forms of cyber attacks for your organization. This devious practice uses deceptive …

Home » Blog overviewPhishing remains popular and comes in all shapes and sizes. Vishing, or Voice Phishing, is one of them. In …

Home » Blog overviewIn the world of cyber threats, it is important to be well-informed about digital dangers. One of the most …

Home » Blog overviewIn an era where cyber threats are constantly evolving, it is essential to protect your business on every front. …

Home » Blog overviewPhishing continues to be a prominent cyber attack. More and more people are being targeted. Figures from VRT show …

Home » Blog overviewAre you familiar with the new NIS2 yet? It is the successor to the 2016 NIS1 directive, often referred …

Home » Blog overviewAs an organization, small or large, you increasingly find yourself in the sights of a cybercriminal. That’s the harsh …

Home » Blog overviewPublic Cloud, a term that has been gaining traction in recent years. That’s because, as an organization, you want …

Home » Blog overviewCollaborate securely across devices in multiple locations. Is your way of working digitally evolving as well? As an organization, …

Home » Blog overviewWorking safely and productively both in the office and remotely? You can! In response to the growing need for …

Home » Blog overviewAre you looking for a virtual workplace solution for your employees? Virtual Desktops are in demand because you work …

Home » Blog overviewThe rollout of 5G networks is driving significant changes in the way we are connected and interact with technology. …

Home » Blog overviewA cybersecurity assessment is an important tool for identifying vulnerabilities and improving the security of your IT systems and …

Home » Blog overviewIs your organisation ready for digital danger? A zero-day attack or zero-hour threat is a cyber attack in which …

Home » Blog overviewIn the event of a cyberattack, are you sure you can recover your critical data? Many organizations are concerned …

Home » Blog overviewAre you ready for your Cybersecurity Assessment? In this blog, you’ll discover 5 tips to properly prepare yourself. A …

Home » Blog overviewIn the digital age, cybersecurity is a critical concern for individuals, businesses and governments around the world. One of …

Home » Blog overviewA cybersecurity audit and a cybersecurity assessment are two tools used to evaluate the security of a company’s online …

Home » Blog overviewOutsourcing cybersecurity can bring many benefits to your business. In this blog, you’ll discover the main reasons: Cost savings: …

Home » Blog overviewProgrammable Logic Controllers (PLCs) are computer-based systems that are used to control industrial processes, such as those in manufacturing, …

Home » Blog overviewTalk about a hot topic! With energy prices increasingly in the spotlight, organizations are raising a pressing question: What …

Home » Blog overviewCybercrime is now also causing a stir in cities and municipalities. Antwerp and Diest are the latest victims. The …

Home » Blog overview Cybersecurity is indispensable for businesses. Attack strategies are constantly evolving so being up-to-date is a must. It is …

Home » Blog overviewStrong basic security is a regulatory requirement. That starts with digital hygiene training for your employees. This necessity has …

Home » Blog overviewSay goodbye to a plethora of cables USB C will become the standard charging protocol for small- to medium-sized …

Home » Blog overviewWith Microsoft Azure, we monitor part of your IT infrastructure. This results in a proactive management that protects your …

Home » Blog overviewThe security software that turned out to be unsecure for 10 years. Avast and AVG are two antivirus programs …

Home » Blog overviewAre you enjoying strong passwords with Bitwarden yet? The trusted password manager has spent the last few years building …

Home » Blog overviewTech companies and Open Source projects aim for the highest level of security. They do this by using so-called …

Home » Blog overviewWe are working more and more in a digital environment. This is accompanied by more services, more applications and …

Home » Blog overviewThe 5 biggest advantages of connecting a legacy system like AS400 to Azure Virtual Desktop: The AS400 system can …

Home » Blog overviewAs a company, it is important to set up proper security in Microsoft 365. Previously, we wrote a blog …

Home » Blog overviewIn November 2021, the Azure DDoS protection platform managed to deflect an attack of 3.47 terabits per second. This …

Home » Blog overviewA disturbing trend in recent years has been the increase in cybercrime. Previously, we wrote a blog about the …

Home » Blog overviewYou’ve probably heard of End-to-end Encryption before. Especially if you use Whatsapp regularly. Messages and calls are end-to-end encrypted …

Home » Blog overviewThe black and white code that experienced its growth during the pandemic; is it safe? The digital acceleration sparked …

Home » Blog overviewMicrosoft offers several licenses aimed at businesses and organizations. Plenty of choice! But which one suits your company best? …

Home » Blog overviewUsers are increasingly exposed to cybercrime. Phishing is the most popular method of stealing important data. This form of …

Home » Blog overviewFind out how we did it Connecting a smart door intercom to Microsoft Teams. That sounds interesting! We at …

Home » Blog overviewDo you also get flooded with emails in the Outlook Web App every day? Then you probably have a …

Home » Blog overviewAt Safe-Connect, we recognized the importance of good air quality in office spaces. Covid-19 reinforced this need and with …

Home » Blog overviewWhat is Log4j and are you affected? There is a major security risk for businesses due to a serious …

Is dark mode worth trying?

Home » Blog overviewThe digitization created new ways of working. Although it offers many advantages, there are also some disadvantages. One is …

Home » Blog overviewCombining cybersecurity and productivity doesn’t have to be a barrier for your organization. Here’s how we do it. A …

Home » Blog overviewMultifactor authentication is necessary to protect us in a digital environment. You can read more about that in our …

Home » Blog overviewOur platforms or devices that we use on a daily basis, have many features in terms of security. You …

Home » Blog overviewIn order to work with different programs or websites, we first need to log in. Our login credentials consist …

Home » Blog overviewIt’s time for Windows 11! Without a doubt, you’ve heard about it. The brand new Windows 11. The 5th …

The Hafnium Hack

Home » Blog overviewAlarming news in the world of cybersecurity. Vulnerabilities in Microsoft Exchange servers allowed hackers to access a company’s servers, …

Home » Blog overviewIt’s becoming increasingly more common. Data breaches, companies being hacked and important information being stolen. It is important as …

The PolyX50

We are increasingly using software such as Teams or Zoom to organise meetings. This is certainly no surprise in a digital Covid era. Video conferencing is becoming increasingly more common. Unfortunately, it can sometimes be difficult to appear professional when the audio and video quality is not optimal. Does this sometimes bother you during important meetings? Fortunately, there is a solution that offers very good video and audio performance and also eliminates cable clutter. At Cats & Dogs, we put it to the test and tested the PolyX50.

Home » Blog overviewTelephony in Teams, is it possible? Microsoft Teams offers usability and many features for countless businesses and organizations. We …

Home » Blog overviewOn the 25th of May 2018, GDPR became law. Yes, that’s almost 2 years ago now. How time flies! …

Home » Blog overviewThe FIRST® LEGO® League is a robot competition for youths aged 11 to 14. The competition is all about Research, Robotics and …