Author: Cyber Morfosis

  • Blog
  • Author: Cyber Morfosis
Service Alert from Cyber Morfosis

Service Alert from Cyber Morfosis

At Cyber Morfosis we are more than happy to introduce our latest offering tailored for businesses, a specialized training on “Secure Coding & Threat Modeling”. This training is designed for your development teams and treats best practices in security, coding standards, and threat analysis to fortify your applications against cyber threats, reduce bugs, and provide

Read More
ID Management implementation

ID Management implementation

Identity Management (ID Management) is a process that involves organizing and controlling the digital identities of individuals (employees/clients/partners/etc.) within an organization, including their personal identifiable information (PII). This process generally includes the creation, modification, and removal of an individual’s account from the system. Here are some practical steps for implementing identity management services: Our experts

Read More
Market Research: Albanian Travel Agencies’ Privacy Policies

Market Research: Albanian Travel Agencies’ Privacy Policies

Cyber Morfosis has completed an analysis of privacy policies across various travel agencies in Albania. The study was meticulously designed to evaluate key aspects such as Compliance (C), Data Security (DS), Data Collection Practices (DCP) and User Rights (UR) among others.Here are some main key insights:1. Compliance Variability. The level of adherence to data protection

Read More
Quick thoughts on SMEs risk levels

Quick thoughts on SMEs risk levels

SMEs quite often underestimate their risk levels and may lack robust security protocols.Here are three main key points to consider: Data Breach Impact – Even a small data breach can have devastating effects, from financial loss to reputation damage. Regula Updates and Backups – Ensure your systems and software are regularly updated. Backup your data frequently.

Read More