That an increasing amount of corporations were pressing users, and corporations to move to what is now known as the cloud. Back then the associated services were referred to as software as a service/ S a a S. Even 10 years ago this was not the most clever solution to vet your company's existence on. … Continue reading Your cloud software solution should have an offline version for business continuity purposes
Tag: cybersecurity
Why a detailed network documentation is essential?
More often than not when I walk into a building I will see RJ-45 network outlets in the wild. Without having done exact calculations I was able to hook up my laptop to this outlet, and have full access to the network. This goes for supermarkets, public administration buildings, and even military installations. What’s particularly … Continue reading Why a detailed network documentation is essential?
Printers should be segregated from the rest of the network
When it comes to security risks for networks, hardly anyone will think of a printer as an existential threat to an organization. However, multiple cases proving that printers, and other IOT devices can act as Trojan horses have surfaced over the last couple of years. There are probably multiple reasons why this is happening, and … Continue reading Printers should be segregated from the rest of the network
Why your privacy matters, and how you can defend it effectively.
Being in IT inevitably brings you to the discussion about privacy. You won’t believe how many times I’ve heard that the person I’m having a conversation with has nothing to hide. And to be perfectly honest this pisses me off. The reason is That privacy it’s not up for debate simply because it’s not something … Continue reading Why your privacy matters, and how you can defend it effectively.
Ux/UI confirmation screens with color differentiation
It’s amazing how many projects there are where money doesn’t play a role; as long as it doesn’t involve user experience, or a user interface that makes sense to users. Recently I was on a project in the financial sector which focused on digital change. We had very fruitful discussions in terms of what to … Continue reading Ux/UI confirmation screens with color differentiation
Visitors by appointment only… even tech workers, maintenance staff, cleaning staff, etc
Probably one of the most interesting incidents I have investigated was the theft of computers from a university. The perpetrator had done a good job scouting out the procedures of the organization, and through his reconnaissance put together a whole deal of information. He knew for instanceHe knew for instance that onHe knew for instance … Continue reading Visitors by appointment only… even tech workers, maintenance staff, cleaning staff, etc
You seriously have to regularly upgrade your printer firmware!
When I heard this argument for the first time over a decade ago I thought it would never be a thing. I was to be proved wrong! A few years ago, I was hired to figure out how a perpetrator got into a corporate network. Like so often, my blue-chip/fortune 500 colleagues had failed to … Continue reading You seriously have to regularly upgrade your printer firmware!
Protecting your organisation from the risk of social engineering
Humans are still the weakest link in cyber security, and they lack training to become aware of the risks. This is a very good example.
Removable media control, Endpoint security and The Problem of transportability of data
Removable media still presents one of the greatest threats; this post outlines one solution of how to deal with it properly.
Cyber Insurance: What is a DDoS attack and how to mitigate it?
DDoS attacks are still a thing. But they are also easy to mitigate. Here is how, and an interesting discussion about the topic.