Pandora Papers- the need for AML procedures is real

The investigation called the Pandora Papers is the collaboration of journalists from all over the world. Among 2.94 terabytes of data they discovered are documents, emails, images, and more, that expose more than 400 politicians, billionaires, celebrities, and members of royal families around the world. Among them: the King of Jordan; the leaders of Ecuador,

What Happens To Your Stolen Identity?

Have you ever been a victim of identity theft? If you have, you know how it can complicate your life. If you haven’t you should consider yourself lucky. The repercussions of identity theft can last from a few days to several years, depending on the type of theft and how quickly it has been reported.

History of Cybersecurity

Cybersecurity has become a priority nowadays in our world. As the amount of personal data becomes more and more available and willingly shared, cybersecurity concerns continue to grow and evolve. And what was considered a strong security a few years ago is no longer valid. The first computer was created in 1943. The machines at

Data encryption – how important is for our cybersecurity?

Encrypting messages and breaking codes are activities that we associate mainly with detective stories full of action. We don’t realize how many aspects of our internet activity are encrypted. Not only the military or the government uses data encryption, but also companies from the e-commerce and finance industries. Our data is also encrypted daily in