Types of Authentication

In IT there are so many authentication options. Here are the 10 commonly used ones. Authentication Description Password-Based Users enter a username and password. Two-Factor (2FA) Combines a password with a second factor like a […]

Security Incident Cheat Sheet

In case of a data breach, ransomware attack or similar there are some steps to follow Step 1 A cyber attack can certainly be classified as a disaster scenario and a clear mind is needed […]