Sep 8, 20235 minPhishing: what it is, how the attack works and how to defend yourselfThe term phishing is a variant of fishing (literally "fish" in English) and alludes to the use of increasingly sophisticated techniques...
Aug 27, 20239 minTwo-factor authentication: why it is needed and how to use it Two-factor or multi-factor authentication, also called strong authentication, is today an indispensable protection system to protect our...
Jul 29, 20235 minPassword ManagerThe previous article we talked about how to create secure passwords and in particular the storage method, unfortunately the passwords to...