The data you store in the cloud must be segregated from that of other clients

The data you store in the cloud must be segregated from that of other clients

One of the most problematic issues that is going to strike us in the near future is the cross infection of systems. Currently there are no sane arguments to support insisting on a totally isolated the violin from the cloud storage provider, but the future in cyber security is always very exciting, and surprises us … Continue reading The data you store in the cloud must be segregated from that of other clients

Why you should isolate un-patchable, end-of-life software

Why you should isolate un-patchable, end-of-life software

And another blog post from the recent past I outlined why a patch policy and an update policy maybe critical for survival of an organization. On rare occasions, and actually more often than desirable critical software upon which the organization relies to operate cannot be updated or patched simply because this piece of software has … Continue reading Why you should isolate un-patchable, end-of-life software

Application security is not necessarily necessary

Application security is not necessarily necessary

Often times applications have reached end-of-life, or are no longer supported by the vendor. In this case organizations tend to weed out or replace such applications simply due to this fact. I was confronted with this organization while performing a due diligence for an investment company. The course after of the organization in question was … Continue reading Application security is not necessarily necessary

Visitors by appointment only… even tech workers, maintenance staff, cleaning staff, etc

Visitors by appointment only… even tech workers, maintenance staff, cleaning staff, etc

Probably one of the most interesting incidents I have investigated was the theft of computers from a university. The perpetrator had done a good job scouting out the procedures of the organization, and through his reconnaissance put together a whole deal of information. He knew for instanceHe knew for instance that onHe knew for instance … Continue reading Visitors by appointment only… even tech workers, maintenance staff, cleaning staff, etc

Your email server should ensure encrypted communication and messaging only

Your email server should ensure encrypted communication and messaging only

As you can see this post was published in 2019. We’ve had pretty much everything about you go south. Probably the most revealing thing, and the only one in years that led to some kind of reaction, where the Snowden revelations. No, one of the main issues is that even after such a major incident, … Continue reading Your email server should ensure encrypted communication and messaging only

Why you need on-location and co-location backups and why they should be encrypted

Why you need on-location and co-location backups and why they should be encrypted

I hope I will be stating the obvious in this post; but I have seen so many things going wrong that I will risk repeating myself! On location back ups are totally cool! They are directly connected to your ethernet, have blazing accessibility rate, superb file transfer speeds, and a variety of other bills and … Continue reading Why you need on-location and co-location backups and why they should be encrypted

Project: Advanced Cybersecurity Risk Assessment Checklist

What is the "Advanced Cybersecurity Risk Assessment Checklist" (ACRAC)?ACRAC allows any organisation to assess a status quo of their cybersecurity. It's a thorough, and constantly updated checklist to reduce common cyber threats organisations are confronted with. Its goal is to raise awareness for vulnerabilities, thereby neutralising a majority of threat vectors an organisation sees itself … Continue reading Project: Advanced Cybersecurity Risk Assessment Checklist

Is your organizations data valuable to outside threats?

Whether or not your organizations data as valuable to outsiders depends heavily on what business you're in. Generally said, your organizations data is valuable :period. There is an ever increasing amounts of data being taken from paper, and digitized. Therefore they are not only victim to attempts of corporate espionage, but also to data collection … Continue reading Is your organizations data valuable to outside threats?