+972 54 230 8652
info@qeldar.com

Tag: Practices

cybersecurity

Cybersecurity Incidents: The Enemy Within

Cybersecurity In The Organization: Not Everything Is As It Seems When you hear or read the words “cybersecurity incident”, you immediately think of sophisticated hackers breaching computer defenses. Like a Hollywood movie, we envision cyber criminals copying sensitive information and then selling or sending it to a corrupt competitor or a dictator in some distant…
Read more

New Digital Transformation

A New Digital Transformation? Yes, And It’s Imperative

Why We Are Talking About a New Digital Transformation? It’s more than clear that the world has changed “thanks” to Covid-19. Individually and socially. And after health, its main victim is the economy. We are in a deep recession whose bottom is not yet in sight. In the context of so great uncertainty, we in…
Read more

organizational communication

Organizational Communication: The Relevance of Channel

Why Channel is Important in Organizational Communication? The communication within the diverse areas and the universe population of companies is one of its most important elements. The information flow is a key component when it comes to promote productivity. Why? Communication within the organization defines how its members will act in connection with it. A…
Read more

Protect Malware Ransomware

How To Protect Your Company From Malware And Ransomware

Business losses from cyber attacks are estimated in the hundreds of millions of dollars. Thus it’s important to protect them against malware and ransomware     More info? Contact us here

Shadow IT

Shadow IT: Yes or No?

What is Shadow IT? There is no doubt that we live in a technological era. To a greater or lesser extent we all make use of technology, on a personal and work level. A limit that many times is not clear. Hence, more and more the organizations’ employees use systems and devices that are not…
Read more

Digital Transformation

Digital Transformation: Grow or Fade Away

Is It Important a Digital Transformation? “Digital transformation? Oh no, that’s for big companies, not for me. ” Many SMEs and individuals thought this. They imagine huge projects with dozens of people involved, expensive software & hardware purchases as well as many months of design and implementation. They are wrong. Beyond the necessary elements and…
Read more

Business meetings

Business Meetings : Key Tips to Take the Most of Them

Why business meetings are time thieves? Nowadays the most expensive asset that people and organizations have is time. It’s a scarce resource, since it can not be generated or recovered. Therefore, we must take care of it. At business level, meetings are the most demanding activities. Normally, an employee can spend more than half of…
Read more

supply chain

ASUS supply chain attack: lessons to learn

A complex supply chain attack In what we can call a complex cyber-espionage operation, hackers infected tens of thousands of computers of Taiwanese brand ASUS, through a supply chain attack. The security researchers at Kapersky Lab reported that they detected at least 57,000 infections among customers of their anti-virus application. About half of those clients…
Read more

IT project