Category: Security

Security is more important than ever. Cybersecurity has been a problem from the start of IT and it will be till the end. It all started with endpoint and network security, but today, we are also facing with cloudsecurity and managing employees to incorporate good security practices.

All these new technologies that help us innovate also helps cybercriminals and state sponsored hackers to get new tools they can use to get access to our systems, and in a worst case scenario, access to our most valuable data and business secrets. Also, with new legislation in place like GDPR, you need to make sure everything is secure, otherwise you just don’t lose your reputation, but you can also be fined by the government. Protecting IT-environments is more important than ever.

Endpoint Security

Your first line of defense is usually endpoint protection. The devices your employees work with need to be protected against ransomware and other malware which can bring lots and lots of trouble. This nowadays the most basic form of protection and many of the bigger vendors and suites can help you achieve this.

Network security

Network security is a bit more advanced, where you can manage which traffic goes across your network. You can also connect different networks together with e.g. SD-WAN. So, you can run protection software and share data between multiple locations. The trend we see in network protection on the datacenter side is to lock down the traffic by only allowing known, benevolent traffic sources. Regarding office networking, we see new initiatives like ZScaler coming up, where you tunnel all your staff over the network of ZScaler so they can analyse the traffic and block patterns that they marked as malicious. Especially for companies with employees that travel a lot, this is a smart solution.

Cloud security

Many thought that bringing workloads to the cloud would reduce their responsibility of doing security. It is now clear that this is not the case. Most cloud vendors practice the “shared responsibility” approach. This means that big hyperscalers can offer a first line of defense against well known threats and port scanners. For the more sophisticated attacks that are directly pointed at your servers, you need to have your protection in place.

Google wants to get rid of the URL completely

Google wants to get rid of the URL completely

Uniform Resource Locators (URLs), the online addresses that are a bit like one of the most important ways of surfing the Internet, have an important problem. Because they have a complex structure, malicious people can easily exploit them. Google wants to do something about that. Now it is easy for a... Read more

date4 years ago
Man remains the weakest link in any security system

Man remains the weakest link in any security system

People remain the weak link in any security system. A new investigation has shown that the vast majority of security incidents can be traced back to the personnel. In the case of a self-reported data breach, the chance is seven times greater that the leak is due to human error than that a hacker was... Read more

date4 years ago
Hackers abuse legitimate Windows tools to steal information

Hackers abuse legitimate Windows tools to steal information

Attackers increasingly use legitimate tools or run simple scripts and shell code directly in memory. These living off the land tactics are less likely to be detected by traditional malware protection, Symantec warns. By carrying out an attack using software and processes that are already present on ... Read more

date4 years ago
In 2019, more IT budget will be spent on cybersecurity.

In 2019, more IT budget will be spent on cybersecurity.

Next year, the IT department of companies will have a larger budget. Most of the money will be spent on cyber security measures. Tech Pro Research reports this in a new research report. According to the report, more than half of the organisations will invest more money in the IT department. By far t... Read more

date4 years ago
IoT botnet Hakai focuses on routers from D-Link, Huawei and Realtek.

IoT botnet Hakai focuses on routers from D-Link, Huawei and Realtek.

After having grown in silence for some time, a new IoT botnet is now slowly making its presence felt. According to security researchers, the Hakai IoT botnet targets routers from D-Link, Huawei and Realtek. Slowly the network grows in size. Hakai (the Japanese word for destruction) was first discove... Read more

date4 years ago
1 186 187 188