Whether you’re working from the office or from home, it’s important to remember the basics of digital security and stay up to date with the latest cybersecurity news.

Report an incidentAsk a question

Please fill in the form below to get immediate assistance from CERT-GIB

Thank you for the inquiry! We will contact you soon.

Any questions? Please contact us to learn more about managing the cyber risks of remote work.

Thank you for getting in touch. We will contact you shortly.


Transitioning employees to remote work increases the risk of company data being stolen and poses other cybersecurity threats.

Digital hygiene rules
for working remotely
Target audience: All employees working from home

The checklist will help maintain a seamless workflow and protect yourself and your loved ones from cyberattacks.

Group-IB specialists have prepared materials to help ensure comfortable and secure remote work for you and your employees.

Methods of organizing
secure remote work
Target audience:Heads/Specialists of IS departments

The described methods will help you independently assess potential risks and ensure that all the necessary technical steps to transition employees to a home office have been taken.

Threat Map H1 2020Target audience: All employees

The infographics showcase the main cyberthreats happening around the globe in the first half of the year

10 Recommendations for preventing ransomware attacksTarget audience:Heads/Specialists of IS departments

The list of recommendations that will ensure your readiness to prevent, detect, and respond to ransomware attacks.

Transition to remote work in numbersTarget audience: All employees

The infographics show current trends in remote work, based on a Group-IB survey conducted among 100 international companies

Is уour corporate portal sufficiently protected?Target audience:Heads/Specialists of IS departments

18-point checklists will assess how secure your corporate portal is.

Master class

Digital Hygiene

During this master class, you will learn how to use corporate and personal devices securely and how to prevent data leaks, credential compromise, and malware infections.


Phishing or not Phishing?
Quiz by Group-IB

Take this quiz to find out if you can identify phishing attacks and avoid becoming a victim


We strive to be a hi-tech content powerhouse and offer recommendations on current cyberthreats and methods to counter them. Keep up to date, broaden your knowledge, stay secure.

High-Tech Crime Trends 2019-2020
Are You Ready for Cyber Incident Response. Expectations vs. Reality
Online Brand Abuse. Latest Trends and Evolution of Scam Method
Red Team vs. Pen Test
Detection of advanced threats. Streamlined response. Threat Hunting.
How to safeguard your business from social engineering attacks
Live discussion
How to keep your data safe in 2020 online
Live discussion
How Fraudsters Attack Their Victims in Early 2020. Case Studies

Sign up for a 1-year Incident Response Retainer
+ get 2 extra months for free

Learn more

Suspect an attack?

Report an incident:


We use cookies on the website to make your browser experience more personal, convenient and secure. You may block or manage the use of cookies, however, in some cases they’re essential to make this site work properly. Learn more about cookies in Group-IB Privacy And Cookies Policy.