Insights and articles

Humanising IT: Introducing Personos and David Klug

Get to know a little more about David Klug and why he started Personos and how Personos could help you.

Read more

How to Prevent a Password Attack

According to Data Breach Investigation Research Reports, 80% of data breaches link to password theft. This type of attack is one of the most popular methods of personal and corporate data breaches, and presents in the form of a phishing attempt, man-in-the-middle attack, brute force attack, and keyloggers.

Read more

What is Elevation Control?

Managing privileges and access control for your employees can be challenging. But if not handled properly, could lead to unintentional security breaches. That is where Elevation Control can help.

Read more

What is Network Access Control (NAC)?

The internet is quickly becoming our primary network, controlling network traffic is much more necessary to protect your devices and data. This is what makes implementing Network AccessControl so important. 

Read more

What is Storage Control?

The cyber threat landscape continues to evolve, and managing your storage is an integral part of your cybersecurity strategy. Storage control can play an important role.

Read more

What is Application Allowlisting?

Keeping an account of all the applications running on your devices is not an easy task. But important to maintain security. This is where Allowlisting comes in.

Read more

What is Malware?

You may have heard of Phishing, Trojans, Viruses and Worms. These are just some of the forms of Malware. We shed some light on Malware and the ways to prevent it from affecting your business.

Read more

What is Application Ring-fencing?

The Application Ring-fencing solution is a powerful tool giving you granular control over applications and allowing better protect of your workstations.

Read more
More about us