AD is a difficult thing to back up. An alternative strategy could be quite easy...
It regularly makes you wonder how many organizations have their servers and other critical infrastructure in rooms marked clearly as the server and communication room.
As you can see this post was published in 2019. We’ve had pretty much everything about you go south. Probably the most revealing thing, and the only one in years that led to some kind of reaction, where the Snowden revelations. No, one of the main issues is that even after such a major incident, … Continue reading Your email server should ensure encrypted communication and messaging only
Humans are still the weakest link in cyber security, and they lack training to become aware of the risks. This is a very good example.
One of the most costly cyber threats/risks is CEO fraud.
Antivirus incidents are quite common. But there are special, and effective ways to handle them.
Removable media still presents one of the greatest threats; this post outlines one solution of how to deal with it properly.
Cyber insurance is becoming every increasingly important product for most organizations. Finding an insurance policy, and an underwriter to understand the risk is very difficult.
With a potential bandwidth of the deep web increasing, it turns more and more into a profitable marketplace. Most recently, employers have sprung up, looking for qualified personnel. Work without the pension scheme’s, 9 to 5, and other inhibiting factors.
Cache currency is a blessing for law-enforcement because it allows them to trace back the origins to a crime. When criminals are forced to resort to crypto currency, the game changes.
The next generation of phishing attacks is there. Brace yourselves, and mitigate!
The #privacy internet is finally becoming faster; a lot!
Cybercrime comes in many forms industrial espionage is one of them. Today, we are not even safe from paper shredders in the offices anymore.
CEO fraud is one of the most devious forms of cybercrime, and social engineering. The most complex form was experienced, and the risk for future attacks was mitigated.
This post is about the security risks of having exposed RJ 45 sockets and your organization.