USB C Standard

USB C will become the standard charging protocol for small- to medium-sized electronic devices starting in the fall of 2024. Convenient, because …

The Azure Monitor

With Microsoft Azure, we monitor part of your IT infrastructure. This results in a proactive management that protects your organization from digital …

Zero Day attack

Avast and AVG are two antivirus programs commonly found on computer systems worldwide. The cybersecurity company, named SentinelOne, discovered two threatening zero …

Are you enjoying strong passwords with Bitwarden yet? The trusted password manager has spent the last few years building a community that …

Bug Bounties Safe-Connect

Tech companies and Open Source projects aim for the highest level of security. They do this by using so-called ‘Bug Bounties’. A …

Bitwarden paswoordloos

We are working more and more in a digital environment. This is accompanied by more services, more applications and a plethora of …

Azure Virtual Desktop Movex

The 5 biggest advantages of connecting a legacy system like AS400 to Azure Virtual Desktop: The AS400 system can be retained without …

MFA prompt proces

As a company, it is important to set up proper security in Microsoft 365. Previously, we wrote a blog about what Multifactor …

DDoS attack

In November 2021, the Azure DDoS protection platform managed to deflect an attack of 3.47 terabits per second. This protection protected the …

The attack on Solarwinds

A disturbing trend in recent years has been the increase in cybercrime. Previously, we wrote a blog about the Hafnium hack. Unfortunately, …

End-to-end encryption

You’ve probably heard of End-to-end Encryption before. Especially if you use Whatsapp regularly. Messages and calls are end-to-end encrypted so no one …

QR-code

The digital acceleration sparked by the corona pandemic introduced us to various technologies. Many learned to work remotely within a digital work …

Microsoft 365

Microsoft offers several licenses aimed at businesses and organizations. Plenty of choice! But which one suits your company best? As a company …

What is Smishing

Users are increasingly exposed to cybercrime. Phishing is the most popular method of stealing important data. This form of digital fraud has …

Microsoft Teams SIP Intercom

Connecting a smart door intercom to Microsoft Teams. That sounds interesting enough! We at Safe-Connect agreed. We found a way to operate …

Outlook Web App

Do you also get flooded with emails in the Outlook Web App every day? Then you probably have a hard time cleaning …

air quality monitor

At Safe-Connect, we recognized the importance of good air quality in office spaces. Covid-19 reinforced this need and with our Managed Services, …

Log4j

What is Log4j and are you affected? There is a major security risk for businesses due to a serious vulnerability in Apache …

dark mode

Is dark mode worth trying?

The digitization created new ways of working. Although it offers many advantages, there are also some disadvantages. One is the increase in …

Multifactor authentication is necessary to protect us in a digital environment. You can read more about that in our blog on the …

log in without entering a password

Our platforms or devices that we use on a daily basis, have many features in terms of security. You will see that …

Multi-factor authentication

In order to work with different programs or websites, we first need to log in. Our login credentials consist of a username …

It’s time for Windows 11! Without a doubt, you’ve heard about it. The brand new Windows 11. The 5th of October was …

The Hafnium Hack

The Hafnium Hack

Alarming news in the world of cybersecurity. Vulnerabilities in Microsoft Exchange servers allowed hackers to access a company’s servers, emails and calendars. …

Training cybersecurity

It’s becoming increasingly more common. Data breaches, companies being hacked and important information being stolen. It is important as a company to …

The PolyX50

We are increasingly using software such as Teams or Zoom to organise meetings. This is certainly no surprise in a digital Covid era. Video conferencing is becoming increasingly more common. Unfortunately, it can sometimes be difficult to appear professional when the audio and video quality is not optimal. Does this sometimes bother you during important meetings? Fortunately, there is a solution that offers very good video and audio performance and also eliminates cable clutter. At Cats & Dogs, we put it to the test and tested the PolyX50.

microsoft secure score

Microsoft Secure Score

Cybersecurity is indispensable for businesses. Attack strategies are constantly evolving so being up-to-date is a must. It is often difficult to get …

Microsoft Teams

Telephony in Teams, is it possible? Microsoft Teams offers usability and many features for countless businesses and organizations. We have been using …

GDPR

On the 25th of May 2018, GDPR became law. Yes, that’s almost 2 years ago now. How time flies! Since I deal …

FIRST-LEGO League

The FIRST® LEGO® League is a robot competition for youths aged 11 to 14. The competition is all about Research, Robotics and Core Values. Participants are …