When it comes to security risks for networks, hardly anyone will think of a printer as an existential threat to an organization. However, multiple cases proving that printers, and other IOT devices can act as Trojan horses have surfaced over the last couple of years. There are probably multiple reasons why this is happening, and … Continue reading Printers should be segregated from the rest of the network
You know how you walk into an office building, and the machines standing around have stickers on them with their IP address clearly visible to the general public? Well, thank you for that! You just saved me a ton of work figuring out which printer I want to attack to get access to the rest … Continue reading Why it’s a bad idea to have your device’s IP address publicly visible!
n fact, they do! Unless you are set in a very dynamic environment, where a lot of changes to files in operational Infrastructure happens You have probably follow the trend, and have a cloud-based back up system in place. And that is a good thing to have! The benefits are obvious… Affordable colocation Of your … Continue reading Do encrypted cloud backups have benefits I’m missing?
One of the most problematic issues that is going to strike us in the near future is the cross infection of systems. Currently there are no sane arguments to support insisting on a totally isolated the violin from the cloud storage provider, but the future in cyber security is always very exciting, and surprises us … Continue reading The data you store in the cloud must be segregated from that of other clients
And another blog post from the recent past I outlined why a patch policy and an update policy maybe critical for survival of an organization. On rare occasions, and actually more often than desirable critical software upon which the organization relies to operate cannot be updated or patched simply because this piece of software has … Continue reading Why you should isolate un-patchable, end-of-life software
Justifiably you have the questions poking around in your head about why you should limit physical access to data? The answer is quite simple::: first of all let’s start with a definition of what I actually try to express with this statement. Physical access refers to any one of your employees being able to plug … Continue reading Physical access to data is restricted?
If you years ago I was contacted by an internationally operating law firm. They had very special requirements as to their data protection. I never did ask about the emphasis they had towards their clients security. We did get to work though, and created a solution that was highly individualized, and fulfilled pretty much all … Continue reading Police Proof local storage/raid proof
EU media’s misinterpretation on espionage and human rights violations in the digital realm
AD is a difficult thing to back up. An alternative strategy could be quite easy...
It regularly makes you wonder how many organizations have their servers and other critical infrastructure in rooms marked clearly as the server and communication room.