Menu

US Region

Grandmetric LLC
Lewes DE 19958
16192 Coastal Hwy USA
EIN: 98-1615498
+1 302 691 94 10
info@grandmetric.com

EMEA Region

GRANDMETRIC Sp. z o.o.
ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43
info@grandmetric.com

UK

Grandmetric LTD
Office 584b
182-184 High Street North
London
E6 2JA
+44 20 3321 5276
info@grandmetric.com

  • en
  • pl
  • Network & Wireless Blog for professionals

    Over 45 thousand readers come back for our content every month!

     

    The 5 most dangerous ransomware attacks in Poland. Is your company really safe?

    According to the Niebezpiecznik.pl portal, ransomware gangs steal huge amounts of data monthly – over 10 terabytes. To better illustrate this – 10 TB is 10,000 hours of Full HD video (each hour is about 1GB) or 2,500 hours of 4K video. It’s imaginative, isn’t it? We know from the KPMG report “Cybersecurity Barometer 2022” […]

    Date: 04.04.2023

    Category:

    Phishing – a big problem for small and medium-sized businesses 

    Phishing is one of the most serious threats facing business owners today. Over the past few years, phishing attacks have become increasingly sophisticated and difficult to detect. Meanwhile, the study “Perception of Cybersecurity among Managers of Polish Companies” was commissioned in 2022 by Sophos*. It showed that more than a quarter of Polish companies do […]

    Date: 04.04.2023

    Category:

    Companies on hackers’ radar. Where to start cybersecurity? 

    Cybersecurity is often associated with large companies and serious financial outlays. This is wrong thinking with very serious business consequences.  According to F5 in its Phishing and Fraud Report, with the outbreak of the pandemic and the move of employees to the home office, the number of phishing or ransomware attacks not only increased by […]

    Date: 03.04.2023

    Category:

    End-of-life for Cisco ASA 5500-X [Updated]

    Cisco ASA EoL EoS – what does EoL / EoS status of Cisco products mean, what does it mean for Cisco ASA lines and could be a replacement line of product?

    Date: 20.03.2023

    Author: Marcin Bialy

    Technological End of Life – what does it mean?

    End-of-life (EoL) is a general term used when the vendor plans to cease the production of a certain product or product line. Taking into account that millions of end clients around the world might be using the product, the EoL comes with a group of milestones that all together form the End of Live of […]

    Date: 13.03.2023

    Author: Marcin Bialy
    Category:

    6 Ways to Secure Your Network & Users with Cisco Security

    Investments in cyber-security are gaining importance more than ever before, and taking care of network security, access, users and data is no longer just a matter of responding to ad hoc threats when they appear. A new reality, where many processes happen virtually or in a cloud environment, requires proactive steps towards achieving effective protection […]

    Date: 23.02.2023

    Managing Cisco Catalyst Switches via Meraki Dashboard – Step-by-Step Guide

    Migrating to a data & service cloud is a thing that resembles a gigantic cargo rolling stock gaining momentum. Its inception is already very far behind us, and currently we’re at a point, where this monstrosity of scrap metal has accelerated so much that it’s impossible to stop. It still picks up speed, grows stronger, […]

    2
    Date: 20.02.2023

    Network Protection – Basic Information

    Nowadays, cybersecurity is one of key areas of IT infrastructure operation. Whether we’re talking about small businesses, or large corporations, appropriate network protection are crucial for ensuring the organization’s continuous operation. Check out what kind of solutions can you use to protect your company’s network from hacking, malware, phishing attacks and many other kinds of […]

    1
    Date: 08.02.2023

    Author: Grandmetric
    Category:

    DNS – What Is It & What Is Its Use?

    Displaying the contents of a website on a computer’s screen is possible thanks to an appropriate network connection. The client, or a web browser, is on one side, and a server with the website’s resources is on another. In order for the connection to be successful, protocols like HTTP or HTTPS and a DNS are […]

    Date: 08.02.2023

    Author: Grandmetric
    Category:

    Three Models of Cisco Umbrella Deployment

    There is no need to convince anyone of the fact that phishing is one of the most widespread methods of attacks on enterprises. The Data Breach Investigation Report 2022 from Verizon shows that phishing is the second greatest (after login credential theft) threat for companies.  It’s worth asking yourself, is there a mechanism that preempts […]

    Date: 07.02.2023

    Author: Marcin Bialy
    Category:
    Load more
    Show all
    Grandmetric