The Cybersecurity Blog

Our blog is the information source of the latest news, opinion, advice, research & insights into cyber security and IT Security for business.

Jimber ‘isolates’ your network from hackers
Jimber “isoleert” je netwerk van hackers

Op 16 september 2022, slechts enkele weken na de verschijning in Fokus IT, stond Jimber als Starter van de Week in het Belgische tijdschrift Knack “s” DataNews “. Je kunt de Engelse vertaling van het originele Nederlandse artikel hier vinden.Cybercriminaliteit […]

Read more
Read More
Jimber ‘isolates’ your network from hackers
Jimber ‘isolates’ your network from hackers

On September 16th 2022, just weeks after the appearance in Fokus IT, Jimber was featured in Belgian magazine Knack’s ‘DataNews’ as Starter of the Week. You can find the English translation of the original Dutch article here.Cybercrime is on the […]

Read more
Read More
What is an API
What is an API

Apps are a huge part of our life, we use them every day. Even when we are working, we are using corporate applications. But do you know what software is behind these applications and what API security entails? What does […]

Read more
Read More
We ensure secure internet access
“Wij zorgen voor veilige internettoegang”

Op 15 juni 2022 stond Jimber in het Belgische tijdschrift Knack’s‘Fokus IT‘. Je kunt de Engelse vertaling van het originele Nederlandse artikel hieronder vinden. De meldingen van cybercriminaliteit nemen elk jaar toe. In 2021 werd ongeveer 12% van de Vlaamse […]

Read more
Read More
We ensure secure internet access
“We ensure secure internet access”

On June 15th 2022, Jimber was featured in Belgian magazine Knack’s ‘Fokus IT‘. You can find the English translation of the original Dutch article below. Reports of cybercrime are increasing every year. In 2021, about 12% of Flemish companies were […]

Read more
Read More
The ransomware attack: what it is and how it works
The ransomware attack: what it is and how it works

Ransomware is malware that hackers use to deny businesses access to their data and demand a ransom for it. Hackers can make huge amounts of money from this practice. Ransomware can have devastating consequences for businesses, from the costs of […]

Read more
Read More
malware-attack-jimber
What is malware?

As the digital landscape continues to evolve, so does malware. Hackers develop new types of malware every year. That’s why you should stay up-to-date on malware news. What is malware? A definition Malware is malicious software that hackers use to […]

Read more
Read More
red-cross-jimber
Cyberattack Red Cross: An interview with cyber experts

The International Red Cross is under attack. They have been the victim of a mass cyberattack. The sensitive data of at least 515.000 vulnerable are at risk. Some of these people were fleeing conflicts or looking for family members they […]

Read more
Read More
red-cross-jimber
Cyberaanval Rode Kruis: Een interview met cyber experten

Het Internationale Rode Kruis wordt aangevallen. Ze zijn het slachtoffer van een massale cyberaanval. De gevoelige gegevens van minstens 515.000 kwetsbare mensen lopen gevaar. Sommige van deze mensen waren op de vlucht voor conflicten of ze zochten familie na een […]

Read more
Read More

Find out how we can protect your business

In our demo call we’ll show you how our technology works and how it can help you secure your data from cyber threats.

Cybersecurity
Are you an integrator or distributor?

Need an affordable cybersecurity solution for your customers?

We’d love to help you get your customers on board.

checkmark

White glove onboarding

checkmark

Team trainings

checkmark

Dedicated customer service rep

checkmark

Invoices for each client

checkmark

Security and Privacy guaranteed