guides

Home/guides
30 11, 2020

Merry Christmas and Happy New Year!

By |2020-11-30T15:52:24+02:00November 30th, 2020|Categories: guides|Comments Off on Merry Christmas and Happy New Year!

As another year comes to a close, Encripto wants to take a moment to express our gratitude to our customers for supporting our business. Thank you for entrusting us with your security projects. Customers like you inspire us to work harder. It has been our pleasure to work with you in 2020.We would like [...]

24 11, 2020

Phishing: What Do you Need to Know? – Part 1

By |2020-11-24T12:52:01+02:00November 24th, 2020|Categories: guides|Comments Off on Phishing: What Do you Need to Know? – Part 1

Phishing is a very common social engineering technique used by cybercriminals to fraudulently obtain confidential information from victims. Phishing is a technique widely used by scammers today. In fact, in the pre-Christmas and Christmas season the amount of this type of scams increases. Phishers can trick you through multiple platforms, such as emails, text [...]

23 11, 2020

Encripto’s 10th Anniversary

By |2020-11-27T10:06:52+02:00November 23rd, 2020|Categories: guides, news|Comments Off on Encripto’s 10th Anniversary

Encripto is celebrating its 10th anniversary on the 25th of November. The company was founded in 2010 by security expert Juan J. Güelfo. Since the beginning, Encripto has been a niche company specialized in information security, and we believe in a more secure IT-world. Success never comes in a day. It requires strong [...]

6 10, 2020

Why is Cyber Security Important? – Part 2

By |2020-10-06T11:34:29+02:00October 6th, 2020|Categories: guides|Comments Off on Why is Cyber Security Important? – Part 2

In our previous post, we covered what cyber security is and why it is important. Also, we gave you some tips to increase cyber security and reduce risk of cyber crime as a company. In this post, we will try to answer the next question: What can you do to improve your cyber [...]

28 09, 2020

Why is Cyber Security Important? – Part 1

By |2020-10-06T11:36:14+02:00September 28th, 2020|Categories: guides|Comments Off on Why is Cyber Security Important? – Part 1

Since 2010, National Security Month is celebrated in October in Norway. During this month, good security practices are promoted. In this blog post, we are going to have a look at what cyber security is and why it is important in our lives. Also, we will give you some tips to improve it. [...]

27 08, 2020

Why should you plan your security test?

By |2020-08-27T14:10:28+02:00August 27th, 2020|Categories: guides|Comments Off on Why should you plan your security test?

Security testing of any application or system is about searching for its potential weaknesses and vulnerabilities, which might result in a security breach. In this blog post, we are going to have a look at why and when you should plan your security test.Encripto delivers two main kinds of security tests:Application testing. Encripto has [...]

7 05, 2020

World Password Day

By |2020-05-22T14:09:39+02:00May 7th, 2020|Categories: guides|Comments Off on World Password Day

Every year on the first Thursday in May, World Password Day is celebrated and good password habits are promoted. Below we have compiled 5 tips to create stronger passwords and better protect your digital accounts against account hacking. Encripto hopes these tips are useful to you, and if you would like to know about [...]

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:58:18+02:00April 13th, 2018|Categories: guides|Comments Off on New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

9 01, 2018

Top 10 Considerations for Incident Response

By |2018-01-09T12:59:35+02:00January 9th, 2018|Categories: guides|Comments Off on Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By |2017-12-18T13:11:37+02:00December 18th, 2017|Categories: guides|Comments Off on 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

Go to Top