img img img img

Blog

Blog

Whether online stores come into scope in the context of NIS 2 Directive?

During our two-day intensive seminar on “NIS 2: Strategies for Effective Compliance” for managers and executives, we commented on an interesting case study on “whether online stores come into scope in the context of Directive 2022/2555?”.   ANNEX II, OTHER CRITICAL SECTORS Point 6.  Digital providers (Providers of online marketplaces) Article 6 Definitions (28) defines: ‘online marketplace’ means […]

Transformational Leadership

What is transformational leadership and why is it so important? Transformational leadership produces higher results than other types of leadership. For example, while transactional leadership (managing through rewards, punishments and exceptions) leads to expected results, transformational leadership leads to results that exceed expectations. A significant body of research finds transformational leaders are more effective and […]

Black Friday, the FOMO effect and what is their relationship to cyber security?

Black Friday comes from American culture as it marks the beginning of “Christmas shopping.” This is the day when all retailers announce traditional discounts on products in order to attract customers. The media is abuzz with coverage of angry crowds fighting over the latest products at the shop counters, and happy customers ostentatiously displaying their […]

How to create strong passwords? Password management and protection.

Passwords have been a method of passage since ancient times. To be granted access to a location or resource, an employee is required to utter or type the correct secret phrase. In military terminology, in addition to a password, a counter password exists as an additional secret and challenge (besides the main password) that aids […]

Flexible Bit becomes a partner of Zonta Bulgaria in the project “NO to cyber violence against women and children”

  Flexible Bit and Zonta Bulgaria will partner on the project “No to cyber violence against women and children”. The project focuses on the social groups most affected by cyber violence – women and children. The global world in which we live provides many opportunities, but also many threats, with the most affected being the […]