For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.

Close

Not a member yet? Register now and get started.

lock and key

Sign in to your account.

Account Login

General  

Ransomware: How to recover your encrypted files, the last guide

In this guide, we will explain how to recover encrypted files focusing on the Data-Locker Ransomware that targets the Windows operating system. Why my system asks me to pay? A ransomware is a computer malware that limits the access of a system and ask for a ransom in order to remove that restriction. The restriction […]

Read more...

Sundown Exploit Kit ‘Larger Threat Than People Realize’

t’s been a tumultuous summer for exploit kits with the demise of Angler, Neutrino and Nuclear, for years each responsible for massive amounts of dollar losses and malware infections. Now, Cisco Talos security researchers are bracing for new entrants to fill the void, starting with the Sundown exploit kit. Over the past six months, Sundown […]

Read more...

4 Types of Cyber Attacks Targeting Manufacturers

The manufacturing industry is not a new target for cyber attacks, but it is experiencing new kinds of attacks. Here’s how to protect your operations. It turns out that things have changed quite a bit recently—most notably, around the types of attacks being aimed at manufacturing sites. Right now, we’re seeing a new wave of […]

Read more...

Mobile Security Challenges In The Age Of Digital Business

After three decades where managing endpoints was synonymous with imposing strict security on laptops, enterprises are about to face a much greater security challenge. IT leaders are asked to protect their enterprise data not just on smartphones and tablets, but while it travels through the Internet of Things (IoT), on connected cars, on smart TVs, […]

Read more...

What Data Breaches Now Cost And Why

New Ponemon report says the cost of a data breach has increased by 23% and healthcare and education breaches are the most pricey. The actual cost of a data breach is all about industry sector and location, location, location. Healthcare and education sectors incur the highest breach costs of all industries, and Germany and the […]

Read more...

Why You Should Enroll In Cyber Security Awareness Training

When it comes to cyber security, even big organizations lack the basic knowledge of how to protect company’s data from the outside. Everyday businesses are facing the threat of phishing, ransomware, data breaches and malware attacks that not only results in millions of dollars losses, but also damaged the reputations. A new study shows that […]

Read more...

Industry IT security shortfalls persist

The increasing number of connected devices is multiplying the probability of cyberattacks on companies across sectors. This is compelling organizations to adopt cybersecurity solutions in order to secure computing resources, information, networks and applications. As such, innovations will be directed towards fortifying sophisticated technologies such as cloud computing, big data, wireless communication, and the Internet […]

Read more...

Launch of new website

Custodis-IT Security Solutions is pleased to announce the release of our new website, designed with a fresh new look and user-friendly navigation, updated with the latest information about our products and services. Our main goals was to build a user-friendly and simple to navigate site. We invite you to start exploring Our business services that defines our organization […]

Read more...