Did you just create a paradise for hackers? – Part 2

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]

How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning [...]

5 Steps to Protect Your Business During This Summer

Finally,  your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime,  managed last-minute tasks and set up your automatic reply. So, [...]

How do you protect your IoT devices from exploitation?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a vision statement, but a reflection of our reality.  From [...]

Security Mistakes that Could Cripple the Network

“Developers are technical and secretive & don’t like being limited. They often have a high level of privileges giving them all kinds of access to the production environment that no one is [...]