skip to main content

Compliance.
Self-evident.

Privacy: there is never enough of it. Strict national and international regulations are a good start. Correct implementation is equally important, however. And that can be done transparently.

Sign in with Apple: the secure alternative

Identity fraud is one of the most rapidly growing online criminal activities. Hackers gain access to personal data by hacking into companies that collect large quantities of data. It is wise to reveal as little as possible about your identity. And Sign in with Apple makes that possible.

Read more

How to deal with shadow IT

More and more employees are using their own devices at the office with a variety of applications and the accompanying risks to security and privacy.

Read more

iOS and iPadOS offer best security

No other operating system is a secure as those of the iPhone and iPad. We will explain why.

Read more

Questions? Contact us

We are always available for questions and comments about mobile working, security and privacy.

Contact us