The Azure Monitor: a glimpse behind the scenes

The Azure Monitor: a glimpse behind the scenes

With Microsoft Azure, we monitor part of your IT infrastructure. This results in a proactive management that protects your organization from digital threats and is one step ahead of cybercrime every time. Are you already using our Managed Services? In this blog we explain how we use the Azure Monitor to secure your organization. Microsoft…

Zero day attack on Avast and AVG causes mayhem

Zero day attack on Avast and AVG causes mayhem

The security software that turned out to be unsecure for 10 years. Avast and AVG are two antivirus programs commonly found on computer systems worldwide. The cybersecurity company, named SentinelOne, discovered two threatening zero day vulnerabilities. That discovery took no less than a decade to occur. SentinelOne suspects that millions of users were exposed to…

Discover the new Bitwarden Username Generator

Discover the new Bitwarden Username Generator

Are you enjoying strong passwords with Bitwarden yet? The trusted password manager has spent the last few years building a community that strives together to create a more secure digital world. They do this by managing login credentials, generating strong passwords and offering a range of useful features. You can read all about Bitwarden on…

Hackers with good intentions are essential

Hackers with good intentions are essential

Tech companies and Open Source projects aim for the highest level of security. They do this by using so-called ‘Bug Bounties’. A concept where ethical hackers are rewarded for finding weaknesses in a system and properly reporting it to the related company. Ethical hackers, also called ‘White Hat hackers’, attack the weaknesses of an IT…

A passwordless experience with Bitwarden

A passwordless experience with Bitwarden

We are working more and more in a digital environment. This is accompanied by more services, more applications and a plethora of accounts. Handy because it can speed up our work, but entering our password every time? Let’s face it; no one likes to do that. Fortunately, a password manager like Bitwarden offers the solution….

Azure Virtual Desktop: bringing an old technology into a new light

Azure Virtual Desktop: bringing an old technology into a new light

The 5 biggest advantages of connecting a legacy system like AS400 to Azure Virtual Desktop: The AS400 system can be retained without migration Working from home becomes possible via the Remote App on desktop computers and Thin clients The connection with AVD increases the security of the AS400 user because MFA becomes available. VPNs become…

The attack on SolarWinds with an international impact

The attack on SolarWinds with an international impact

A disturbing trend in recent years has been the increase in cybercrime. Previously, we wrote a blog about the Hafnium hack. Unfortunately, there are several incidents where the consequences are significant. The attack on SolarWinds in 2019, now also commonly known as Solorigate, is the most unprecedented cyber security breach to date. The reason it…

Explained: what is End-To-End Encryption?

Explained: what is End-To-End Encryption?

You’ve probably heard of End-to-end Encryption before. Especially if you use Whatsapp regularly. Messages and calls are end-to-end encrypted so no one outside the chat can read or listen to them. Sounds good. But how does that actually work and in what environments is it used? We will be covering it for you in this…

Everything you need to know about the security of a QR code

Everything you need to know about the security of a QR code

The black and white code that experienced its growth during the pandemic; is it safe? The digital acceleration sparked by the corona pandemic introduced us to various technologies. Many learned to work remotely within a digital work environment. It was not only in the corporate culture that we saw this acceleration. Every industry adapted to…

What is Smishing? The next form of cybercrime?

What is Smishing? The next form of cybercrime?

Users are increasingly exposed to cybercrime. Phishing is the most popular method of stealing important data. This form of digital fraud has been around since 1995, sounds familiar and is unfortunately very effective. Smishing is a variant of this technique and is becoming increasingly popular. What is Smishing exactly? A quick recap: Phishing in a…

Bitwarden password manager

Bitwarden password manager

Businesses and users log in daily to access information and programs. We constantly wonder if these logins are still good enough. Do they guarantee our security or are we at risk of being hacked? Unfortunately, the passwords we create ourselves are no longer good enough. At Safe-Connect we were looking for a solution. We quickly…

Microsoft Business Premium

Microsoft Business Premium

Combining cybersecurity and productivity doesn’t have to be a barrier for your organization. Here’s how we do it. A major rise in the number of cyber threats over the past few years caused companies to start securing themselves better. We see that especially the small and medium enterprises are now the target of attacks because…

Can Bitwarden guarantee our security?

Can Bitwarden guarantee our security?

Multifactor authentication is necessary to protect us in a digital environment. You can read more about that in our blog on the importance of MFA. In this blog we describe the need for a complex password and the solution; using a password manager like Bitwarden. The password we enter every time we log in. A…

Can MFA secure our personal identity?

Can MFA secure our personal identity?

In order to work with different programs or websites, we first need to log in. Our login credentials consist of a username and password. Is that password enough to ensure your safety? The answer is no. We tend to be prone to using passwords that are too weak as Michael McIntyre demonstrates in a humorous…

The Hafnium Hack

The Hafnium Hack

Alarming news in the world of cybersecurity. Vulnerabilities in Microsoft Exchange servers allowed hackers to access a company’s servers, emails and calendars. Hafnium, a group of hackers that is well trained and operates in a sophisticated manner from China is the culprit. The Hafnium Hack. It was revealed in March 2021 and it caused a…

Train your users in digital hygiene

Train your users in digital hygiene

It’s becoming increasingly more common. Data breaches, companies being hacked and important information being stolen. It is important as a company to identify where your organization is vulnerable. Establishing excellent security is a priority. You can read more about cybersecurity here. Unfortunately, hackers attack you where you are most vulnerable, which may be your employees….

Microsoft Secure Score explained

Microsoft Secure Score explained

Cybersecurity is indispensable for businesses. Attack strategies are constantly evolving so being up-to-date is a must. It is often difficult to get an overview of your organization’s current security level. Microsoft makes it happen with Microsoft Secure Score. A tool that performs a security analysis within Microsoft 365. The Microsoft Secure ScoreĀ belongs to Microsoft 365…

GDPR, too far or a wake-up call?

GDPR, too far or a wake-up call?

On the 25th of May 2018, GDPR became law. Yes, that’s almost 2 years ago now. How time flies! Since I deal a lot with personal data of customers, visitors, prospects and more in my job, I thought it was important to be well informed about what this law entailed. Therefore, I started my research…