Top 10 Tips to Spring Clean Your Cybersecurity

With spring in full swing, organizations should definitely dedicate some time to scrubbing and sprucing up their security. While for many households clearing clutter is an annual ritual that [...]

Did you just create a paradise for hackers? – Part 2

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]

How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning [...]

5 Steps to Protect Your Business During This Summer

Finally,  your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime,  managed last-minute tasks and set up your automatic reply. So, [...]

How do you protect your IoT devices from exploitation?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a vision statement, but a reflection of our reality.  From [...]

Security Mistakes that Could Cripple the Network

“Developers are technical and secretive & don’t like being limited. They often have a high level of privileges giving them all kinds of access to the production environment that no one is [...]