6 12, 2022

Cyberattack in the city Antwerp and our Network Isolation


The city of Antwerp has once again become a victim of cybercrime. In a few weeks' time, Antwerp, or a police zone from Antwerp, became the victim of cybercriminals. The question that we ask ourselves at Jimber is: “Can the Zero Trust principle offer a solution for organizations that [...]

31 10, 2022

What is zero trust architecture?


Better malware, mobile devices, IoT devices, cloud applications and remote workers are all threats to businesses nowadays. Threats can come from inside and data can be stored outside of the company network. This makes cybersecurity a difficult task for every business. Traditional IT network security is based on the [...]

26 09, 2022

Jimber ‘isolates’ your network from hackers


On September 16th 2022, just weeks after the appearance in Fokus IT, Jimber was featured in Belgian magazine Knack's 'DataNews' as Starter of the Week. You can find the English translation of the original Dutch article here. Cybercrime is on the rise, and companies are finally starting to realise [...]

5 08, 2022

What is an API


Apps are a huge part of our life, we use them every day. Even when we are working, we are using corporate applications. But do you know what software is behind these applications and what API security entails? What does API stand for? API stands for Application Programming Interface. It [...]

14 06, 2022

“We ensure secure internet access”


On June 15th 2022, Jimber was featured in Belgian magazine Knack's 'Fokus IT'. You can find the English translation of the original Dutch article below. Reports of cybercrime are increasing every year. In 2021, about 12% of Flemish companies were faced with a cyberattack. Data loss is not the only [...]

20 04, 2022

The ransomware attack: what it is and how it works


Ransomware is malware that hackers use to deny businesses access to their data and demand a ransom for it. Hackers can make huge amounts of money from this practice. Ransomware can have devastating consequences for businesses, from the costs of the ransom demand to reputation damage. These kinds of [...]

27 01, 2022

What is malware?


As the digital landscape continues to evolve, so does malware. Hackers develop new types of malware every year. That’s why you should stay up-to-date on malware news. What is malware? A definition Malware is malicious software that hackers use to attack your computer systems. Their goal is to damage or [...]

27 01, 2022

Cyberattack Red Cross: An interview with cyber experts


The International Red Cross is under attack. They have been the victim of a mass cyberattack. The sensitive data of at least 515.000 vulnerable are at risk. Some of these people were fleeing conflicts or looking for family members they lost after a disaster, conflict, or detention. The Red Cross [...]

23 11, 2021

What is data encryption?


Data encryption is there to protect sensitive and private data. Data encryption improves the security between apps and servers. Unauthorized people will not be able to read your data when you use encryption technology. Data is vulnerable because of the way it's stored and transmitted, so protecting digital confidentiality [...]

13 10, 2021

The OWASP top ten 2021


What is OWASP? OWASP (Open Web Application Security Project) is a non-profit organisation focused on improving website security. They provide open-source software development programs, project, toolkits, local chapters, conferences, articles, videos, forums, methodologies, documentation and technologies to their community. They provide all these tools and knowledge free of charge [...]

Go to Top