The Cybersecurity Blog

Our blog is the information source of the latest news, opinion, advice, research & insights into cyber security and IT Security for business.

NIS2 event

NIS2 event

Join us as we reflect on our memorable experience at Copaco’s NIS2 event, discussing the impact of the NIS2 Directive on cybersecurity, Jimber’s role in network isolation, and the vibrant community interactions. Dive into our insights and stories from this pivotal gathering

Read More »
Fortinet Deprecates SSL VPN

Fortinet Deprecates SSL VPN: What This Means and Why It Matters

Fortinet has recently deprecated the use of SSL VPN tunnel mode across all FortiGate appliances
Your Key to Effortless Cyber Resilience Compliance

Introducing CRACY: Your Key to Effortless Cyber Resilience Compliance

Discover CRACY, the EU-backed initiative that simplifies Cyber Resilience Act (CRA) compliance for businesses. Get
NIS2 event

NIS2 event

Join us as we reflect on our memorable experience at Copaco's NIS2 event, discussing the
winrar-vulnerability-update-now-jimber-cybersecurity

WinRAR files susceptible to malicious exploitation: urgent update required

WinRAR files are vulnerable to potential abuse for running malware. Learn about the urgent update
copaco-belgium-jimber-cybersecurity

Copaco Belgium joins forces with Jimber

We are thrilled to share Jimber is joining forces with Copaco Belgium to elevate the
network-segmentation-jimber

What is network segmentation: Understanding the basics

What is network segmentation? Discover the definition, different types of network segmentation and why it
Top-10-cybersecurity-trends-of-2023-jimber

Top 10 cybersecurity trends of 2023

We have come a long way since 2022. Here are our top 10 cybersecurity trends
Cyberattack in the city Antwerp and our Network Isolation

Cyberattack in the city Antwerp and our Network Isolation

The city of Antwerp has once again become a victim of cybercrime. In a few

What is zero trust architecture?

What is zero trust architecture?

Better malware, mobile devices, IoT devices, cloud applications and remote workers are all threats to

Find out how we can protect your business

In our demo call we’ll show you how our technology works and how it can help you secure your data from cyber threats.

Cybersecurity
Are you an integrator or distributor?

Need an affordable cybersecurity solution for your customers?

We’d love to help you get your customers on board.

checkmark

White glove onboarding

checkmark

Team trainings

checkmark

Dedicated customer service rep

checkmark

Invoices for each client

checkmark

Security and Privacy guaranteed