BLOG

Latest Articles

Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

Ransomware continues to evolve as one of the most devastating cybersecurity threats, and attackers are finding new ways to exploit vulnerabilities. One such method involves targeting publicly shared SMB2 (Server Message Block version 2) connections

Phishing 2.0: New Techniques Cybercriminals Use to Trick Victims

Phishing has drastically transformed from its early days as a simple scam targeting unwary email users. Modern phishing techniques—dubbed “Phishing 2.0″—are more complex, highly tailored, and designed to bypass even the most robust security systems.

Strengthening BYOD Security in Mid-Sized Enterprises

The rise of remote work has led to an increase in BYOD, presenting organizations with the challenge of securing devices they do not own. This article discusses a cloud-based architecture that enables centralized control over BYOD, including security posture checks, real-time enforcement, and logging.

Checking QR codes in emails

In an attempt to bypass security solutions, attackers are increasingly hiding phishing and other malicious links inside QR codes. It’s for this reason that we’ve added a technology to Kaspersky Secure Mail Gateway that reads QR codes (including ones hidden inside PDF files), extracts links and checks them before they land in an employee’s inbox. We explain how it works.

Why advanced identity protector is a must-have in 2025

Do you believe it is not possible to wake up one morning and discover your bank account is empty or your credit cards maxed out? Rethink your thoughts, as the risk of becoming the next victim of identity theft is real, and hundreds, if not thousands, of people face this reality every day, often discovering it too late.

Call Us

Talk to our team today

09178482592 / 09171629417

Email us

Have more question

onlinesales@isn.com.ph

Lead the Way in Cybersecurity