Tag Archives: Webinar

Security seminars coming up: get up to speed in 60 minutes

Summer holiday is officially over, and we are in for a challenging last quarter of the year. Plenty of challenges: we are all working towards a more open and mobile digital environment, while the cyber-baddies are preparing plenty of new attacks. And the time to comply with GDPR is shrinking daily.

This may seem scary, but meanwhile an entire security industry is working hard to keep one step ahead of the bad guys. In handy interactive sessions of no more than 60 minutes just before lunchtime (11am to 12 pm), you can find out all about the latest security trends and get an answer to all of your questions. And we will organize each session twice, so you don’t have to miss any of them. Get up to speed in 60 minutes, by signing up for our webinars!    Continue reading

Cyber Espionage Tops the List as Most Serious Threat Concern to Global Businesses in 2017

Latest research from Trend Micro, global leader in cybersecurity solutions, reveals that 20 percent of global organizations rank cyber espionage as the most serious threat to their business, with a quarter (26 percent) struggling to keep up with the rapidly evolving threat landscape. In addition, one in five (20 percent) U.S. organizations have suffered a cyber espionage-related attack in the last year. Continue reading

Security webinars coming up

In marketing and communication there’s a trend not to mention products too often, but rather focus on the benefits, the problems that are tackled, etc. We are all in favor, but  that doesn’t mean you should neglect proper education and training.

In the coming months we will be sharing insights in three key Trend Micro solutions, starting with OfficeScan – that can defend you against ransomware – on April 15th. Just click here to sign up!
Continue reading

Build your line of defense [security webinars]

Cybersecurity is a frequently returning topic in all business environments, but what does it mean? There’s so much to be protected these days that it’s a challenge to know where to start, how to make it work technically, how to integrate different security solutions?

Continue reading