Search

Wiper attack response playbook: threat overview, response phases, and priorities
Safeonweb@work
CCB
Article -
Published: 14/01/2026
Immutable backups: objectives, good practices, and benefits
Safeonweb@work
CCB
Article -
Published: 14/01/2026
Cloud Under Fire: Data Breaches Are Getting Worse
Safeonweb@work
Article
Published: 16/06/2025
How Indicators of Compromise (IoCs) contribute to increased cybersecurity
Safeonweb@work
Article
Published: 17/03/2025
CCB’s Cyber Tips: How to mitigate security risks for Remote Desktop Protocol (RDP)
Safeonweb@work
Article
Published: 16/05/2024
Tech: DDoS Protection and Prevention - Technical Guideline 2024
Safeonweb@work
CCB
Article
Published: 16/02/2024
Ransomware guide for small to medium sized organizations
Safeonweb@work
Article
Published: 11/08/2023
First aid in the event of cybercrime: the FEB launches a guide for businesses hit by cyberattacks
Safeonweb@work
Article
Published: 20/07/2023
Protect accounts with multi-factor authentication (2FA/MFA)
Safeonweb@work
CCB
Article
Published: 25/07/2023
How to respond to a ransomware attack in 12 steps
Safeonweb@work
CCB
Article
Published: 23/07/2023