knowledge
Downloadable Materials
ISH
main cyber vulnerabilities exploited in 2023
We point out the main vulnerabilities exploited and the number of ransomware attacks in 2023.
ISH
connected children and ai: protecting the next generation
We have prepared material with valuable tips
on how to guide the new
generations to live with
artificial intelligence.
ISH
The end of passwords: Towards a passwordless future
We've prepared material with important insights into biometric authentication and other alternatives to keep you safe.
ISH
BIANNUAL VULNERABILITY REPORT
We point out critical vulnerabilities and the most dangerous ransomware groups of 2023.
ISH
How to establish sound security policies and practices
We list 10 steps to establish sound cybersecurity policies and practices in your company.
ISH
CYBERSECURITY GUIDE FOR YOUR CHILDREN
We have prepared a cybersecurity guide that will help you learn ways to make your digital experience safer.
ISH
Ransomware: What to do during an attack?
We list 10 practical lessons on how to act to minimize the damage of an attack on your company.
ISH
Ransomware: What to do before an attack?
We list 7 practical lessons on how to prepare within your organization for a possible attack.
ISH
CHECK OUT THE TOP 15 VULNERABILITIES OF 2022
We list the top vulnerabilities exploited in cyber attacks in 2022.
ISH
ATTACKS ON THE
SUPPLY CHAIN
Understand why supply chains are currently the fastest growing attack surface in enterprises.
ISH
BIANNUAL VULNERABILITY REPORT
We point out the five most dangerous Ransomware groups in the first half of 2022.
ISH
PROTECTING DIGITAL INFORMATION
We have prepared a checklist for evaluating strategies and implementing efficient data protection in the company.
ISH
CYBERSECURITY MANUAL
ON A DAILY BASIS
Understand cyber scams and know what steps to take for an efficient security posture.
ISH
CYBERSECURITY HANDBOOK FOR EXECUTIVES
Executives are more likely to suffer cyber attacks. Understand in detail how to protect sensitive information.
ISH
ISH Alert -
Passwordstealer
Ongoing campaign of massive credential theft via spear phishing. Learn how to mitigate these threats.
ISH
ISH Alert -
Microsoft Exchange
Active exploitation of vulnerabilities in products. Microsoft Exchange Server. Understand the updates in this material.
ISH
The evolution of security
in the SOC
Understand the important role of the SOC (Security Operations Center) in the growth of companies.
ISH
Am I being
attacked?
Understand where to start the analysis in the company and what detection strategies to adopt.