DDoS attacks are still a thing. But they are also easy to mitigate. Here is how, and an interesting discussion about the topic.
Category: cyber security
Why is it important to have a BOYD policy
Bring your own device or BOYD has become a trend in organizations and bring as many benefits. However, certain risks along, too!
Why it’s a good idea to isolate EOL applications/software with insufficient patches, and how to do it
Software that it’s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.
Why you don’t want your RJ 45 sockets available in the wild
This post is about the security risks of having exposed RJ 45 sockets and your organization.