Blog - SearchInform

Blog

Best Computer Security Protection

05.09.2022

How to ensure best computer security protection?


Devices Fraud

Best Endpoint Protection

05.09.2022

What is an efficient endpoint protection and a slight overvierw of best solutions.


Devices Fraud Blocking

Security in an ever more connected world

25.06.2020

We live in a world that is forever shrinking, and the more connected we become to the things in our environment, the more convenient our errands and everyday work become.


Devices Cloud Risk assessment

Voice assistants risk assessment

22.11.2019

Voice assistants became subject to investigative journalism — a few high profile publications made readers think twice before using a “helper” or even talking close to the microphone. And that is what we have learned this year.


Devices Third party Personal data

Protecting information on flash drives | how to protect files on flash drives

15.10.2019

A joint study of Illinois and Michigan universities revealed that 48% of people plug in random flash drives. We have selected the main points and findings which prove that the user behaviour plays an important role in protecting information.


Devices Confidential documents Database

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.