DE
EN

References

Sooner or later, every web page visitor might wonder: “Are they really able to provide all that stuff?” or “Are they working for any well-known company?”. We would probably wonder about the same. But to be honest, would you ask your dentist who else he is treating? Or could you imagine your tax accountant chatting about his customers?

Therefore, we refrain from mentioning any reference on our website. We will however gladly share our experience and case studies from completed projects in a personal conversation – without disclosing the names of customers or customer-specific details. Please just fill out the contact form below and we are happy to call you back. And of course you can also contact us directly.

We are looking forward to the conversation and treat every inquiry confidentially, with care and without any obligation on your side.

Did you know?...

  • "Passwords are like underwear. Don't leave them out where people can see them, change them regularly, and don't loan 'em out."

    A piece of advise from tech expert Chris Pirillo.

  • "The best way to get the right answer on the internet is not to ask a question; it's to post the wrong answer."

    Cunningham's Law

  • ...that 30% of IT security breaches are cause by internal actors.

  • ... that 29.2% of malware are hidden in MS Office or Windows executable files.

  • ... that 58% of the victims of data breaches are categorized as small businesses.

  • ... that more than 99% of the attacks require human interaction to succeed.

     

  • ... that phishing scam costs for businesses added up to $3 billion in the last years.

    Source: Symantec Threat Report

  • ... that the number one threat in breaching IT security systems is through social engineering.

    Source: Phishing as a Service: The Phishing landscape

  • ...that 3.8 million records are stolen from businesses every day.

  • … that 93% of breaches could have been avoided by taking simple steps like two-factor authentication.

  • “Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.”

    Kevin Mitnick, American computer security consultant, author, and hacker

  • … that 91% of cyber-attacks in 2017 started with a phishing email.

  • … that one of the biggest bank heists was done electronically. In 2016 $101 million were illegally transferred from the Federal Reserve Bank of New York to private accounts in Sri Lanka and the Philippines. The "bank robber" was embedded in a macro of a Word-file.

    Source: wikipedia.org

     

     

Contact us now


SignalBlueA Nowak & Partner Co. Ltd. brand

Internet security cybersecurity IT solutions network support audit remote hacker hacking virus bluescreen backup

 

5Fl. Myeongbong Building
152 Hannam-daero, Yongsan-gu
Seoul 04417, Republic of Korea


Telefon: +82-(0)2-701-4707
E-Mail: info@signalblue-korea.com