Skip to content
  • Blog and News
  • What we do
  • Books
  • Contact
  • About
  • Suomeksi

Andalys

Articles, Ebook Production, Web sites

Andalys logo
librewolf browser
Posted in Security

Has security and privacy in web browsers improved since the last year?

Posted on 2023-03-052023-02-28 by Sommet

Security and privacy features in a number of web browsers have improved since the last time we checked a year ago. Since most browser developers claim that their browser is secure and protects your private data from tracking, the valuable insight Read >

man pointing a finger at himself
Posted in Books, Security

10 cornerstones for managing cyber security

Posted on 2023-02-022023-01-26 by Ari

I recently read a book titled Cyber Crisis that has a mission to convince every business manager and a person who owns a phone, computer, game console or an electronics device that cybersecurity is everyone’s business. The author Eric Cole, an Read >

mastodon migration screen shot
Posted in Communications, Media, Technology

How to migrate to another Mastodon server

Posted on 2023-01-112023-01-03 by Sam JJ

So I decided to move to a new Mastodon server (also known as an instance) that had terms better suitable for one of our foreign language blogs. It is really amazing that a migration function even exists in a social media Read >

house keys on computer keyboard
Posted in Security

Cybersecurity trends for small businesses and homes for 2023

Posted on 2022-12-262022-12-23 by Ari

While small organizations and home computer users continually learn more about cybersecurity, information technology develops as well. Managers can adopt the latest tools to protect important business data within organizations and family heads can protect sensitive personal data at homes. Cybercriminals, Read >

phone, e-reader, mobile router
Posted in Technology, Travel

Mobile devices you need for staying online on the road

Posted on 2022-12-072022-12-01 by Ari

Planning what to pack on a trip can be a tricky task, and if your work involves computers and connectivity, it complicates the task even more. The length of a trip, is it a work or leisure journey, the packing space Read >

hard drive chained
Posted in Security

How does a small business recover from a cyber security incident?

Posted on 2022-11-212022-11-10 by Sommet

The mantra of cyber security experts is that you shouldn’t make plans thinking if you are hacked, but plan for recovery when you are hacked. Sure, according to studies and statistics it is practically inevitable that especially small organizations easily Read >

hooded man with trust sign in hand. photo gerd altmann
Posted in Security

The most successful cyber attack method is triggered by victims themselves

Posted on 2022-11-032022-10-28 by Sommet

The nasty thing with social engineering is that the victim falls for a scam, and ultimately helps cyber criminals to achieve their goal. Typically they want to break into a large computer system or simply access the victim’s bank account. While Read >

opening a door lock with keys
Posted in Security

The problem with privacy: ideas and real life behavior don’t match

Posted on 2022-10-022022-10-04 by Ari

Scientists have researched for years the mismatch of results originating from interviews and surveys, and the actual behavior of people. Something tends to be wrong with the results, although respondents feel they have given accurate answers. This phenomenon is surprisingly evident Read >

videocamera and laptop
Posted in Media

Is social media on a trajectory to become an old-media like gatekeeper?

Posted on 2022-09-18 by Sam JJ

What a joy it was to realize that it really was possible to publish anything we wanted on a blog, or comment on other people’s blogs. Sharing witty remarks on Twitter and holiday beach photos on Facebook was better than prime Read >

twitter. security help fir users, screen shot
Posted in Security

What small businesses and homes can learn from the Twitter whistleblower

Posted on 2022-09-052022-09-02 by Ari

One of the last big decisions Jack Dorsey made before handing over Twitter’s CEO responsibilities to Parag Agrawal was to hire a cybersecurity expert to fix the numerous security problems the company has. Peiter “Mudge” Zatko accepted Dorsey’s offer, and took Read >

Posts navigation

Older posts

Recent Posts

  • Has security and privacy in web browsers improved since the last year?
  • 10 cornerstones for managing cyber security
  • How to migrate to another Mastodon server
  • Cybersecurity trends for small businesses and homes for 2023
  • Mobile devices you need for staying online on the road

Follow us:

Social meda feed
Newsfeed (RSS/XML)
  • Blog and News
  • What we do
  • Books
  • Contact
  • About
  • Suomeksi

Advertisements

Ebook downloads for travelers

download travel guide to Valencia, Spain

Technology Newsfeed

Categories

Tags

Android app Apple browser cloud CMS cyber debian ebook email Facebook Google guide hacker laptop linux macOS Microsoft mobile network nextcloud online open source operating system phone plugin privacy report research review security server service social media software study survey tablet tracking Twitter upgrade web site Windows Wordpress writing

Archives

Privacy notice: this web site uses cookies to personalise ads, to provide social media features and to enable collection of traffic statistics. Information about your use of this site is shared with social media, advertising and analytics partners.

Blog and News | What we do | Books | Contact | About | Terms of Use | Privacy Policy | Cookie Policy | Impressum | Advertise | Suomeksi
Copyright Andalys 2023
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. In Settings, you can choose which cookies are saved. By clicking Accept, you save your Settings and consent to our cookie policy.
Do not sell my personal information.
SettingsACCEPT
Manage consent
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT