BLOG

4 min read

3 Cybersecurity Trends For 2020

By Alma Pranoto on Feb 4, 2020 5:18:39 AM

The world of IT security is evolving in 2020, are we? 

Continue Reading
3 min read

IT security in 6 steps with Zero Trust

By Andreas Fuchs on Jan 24, 2020 3:35:53 PM

source: iStock
The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable asset that must be protected.
In the last blog post "What elements does a ZERO trust model consist of" we talked about the pillars of a Zero Trust architecture. In this article, we explain step by step how to implement Zero Trust in your company.
Continue Reading
2 min read

Risk Assessment with the SPE model

By Mohamad Ashokaibi on Dec 20, 2019 11:29:13 AM

Risk lies around every corner and should be expected at any time. In the world of IT, risk is inherently everywhere and comes in many shapes and forms. Consequently, the task of writing down all possible risks threatening an IT infrastructure can be daunting and never-ending.

Continue Reading
3 min read

What elements does a ZERO trust model consist of?

By Andreas Fuchs on Dec 3, 2019 5:11:01 PM

The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to protect.

In the last blog post "This is how IT security works with Zero Trust today" we talked about what Zero Trust is and the rationality behind it.

Continue Reading
5 min read

This is how IT security works with Zero Trust today

By Andreas Fuchs on Nov 20, 2019 7:51:35 PM

Source: Cecile Arcurs | iStock

Why today's IT security architectures should be designed according to the ZERO TRUST model

Continue Reading
4 min read

Simple Passwords Weaken IT Security

By Alma Pranoto on Aug 20, 2019 8:09:00 PM

By Alma Pranoto
Continue Reading
2 min read

Is it really AI?

By Alfred Ortiz on Jul 30, 2019 3:40:00 PM

by Alfred Ortiz, CEO of CyberSoftwareDistributors LLC and Doctoral Candidate in Information Systems at IE University in Madrid, Spain.  

 

Continue Reading
4 min read

Zero Trust - The Blueprint To Safeguard Your Digital Business

By Alma Pranoto on Jul 2, 2019 9:18:49 AM

Continue Reading
2 min read

Why Small Businesses Need a Managed Security Service

By Alma Pranoto on Apr 26, 2019 11:16:43 AM

Continue Reading
3 min read

3 Benefits of a Managed Security Service

By Alma Pranoto on Mar 31, 2019 6:37:06 AM

Continue Reading
3 min read

Extortion becomes the new normal for Cybercrime

By Andreas Fuchs on Jan 25, 2019 8:58:00 AM

In 2017, WannaCry Ransomware spread to 100 countries over a weekend. Don't expect patching to stop the business model of digital blackmail. Be prepared!

Continue Reading
3 min read

Avoid Cyber Risks In An IIoT World

By Alma Pranoto on Dec 21, 2018 12:26:47 AM

Continue Reading
3 min read

Rolling Out Microsoft BitLocker Without Headaches

By Alma Pranoto on Dec 7, 2018 12:30:00 AM

 

Continue Reading
4 min read

Enforcing The Human Firewall

By Alma Pranoto on Nov 26, 2018 10:30:00 PM

By Alma Pranoto

Continue Reading
4 min read

How To Make Endpoint Security Easy And Effective

By Alma Pranoto on Nov 21, 2018 10:30:00 PM

Continue Reading
4 min read

3 Data Encryption Facts Your Business Is Missing!

By Alma Pranoto on Oct 24, 2018 3:02:45 AM

Picture by LaymanZoom | iStock

By Alma Pranoto

 

1. THE SHOCKING STATISTICS OF DATA BREACH

According to the IBM 2018 Cost of a Data Breach Studyit costs $3.86 million US to cover an average data breach. This cost will increase by 6.4% per year and the likelihood of a recurring breach over the next two years is 27.9%. 

Continue Reading
24 min read

Don’t avoid FDE adoption anymore!

By Mohamad Ashokaibi on Sep 24, 2018 9:12:00 AM


                                                                                                                                                                                                             Picture by anyaberkut | iStock
Continue Reading
13 min read

Time to stop USB drive horror stories!

By Mohamad Ashokaibi on Jul 1, 2018 5:51:59 PM


                                                                                                                                                  Picture by Antonio Guillem

by Mohamad Ashokaibi

  • CFO: “I've lost my USB thumb drive. Lots of important spreadsheets were there! Do something please!”

  • Project Manager: “I’ve just used my USB external drive on a contractor’s laptop who said he never had an AV. Can I use it safely on the company’s laptop again?”

  • Sales Lady: “Remember the USB drive the company has given me? Seems I dropped it in that taxi yesterday while on my way home. Could I ever know what I backed up on it before leaving the office?”

  • Engineering Team Lead: “Since my colleague checked her SD card on my PC this morning I don’t seem to be able to open my project documents anymore. They all are unreadable. What could it be?”

  • Risk Management Head: “We have a new requirement; all USB storage devices must be blocked inside our corporate network, except company-provided sticks which must be encrypted before use. Can we do that?”

Continue Reading
23 min read

And still nothing much done to educate our end-users!

By Mohamad Ashokaibi on Jul 1, 2018 5:39:05 PM

                                                                                                                                                    Picture by nd3000 | iStock

by Mohamad Ashokaibi

Continue Reading

Featured