guides

Home/guides
12 01, 2017

How Much Does a Network Security Test Cost?

By |2017-01-31T15:13:16+02:00januar 12th, 2017|Categories: guides|Kommentarer er skrudd av for How Much Does a Network Security Test Cost?

Cyber attacks are a risk for all businesses, regardless of size. A security test can reveal if your security measures can withstand external threats, and whether they are adequate and functioning correctly. Effective network security testing simulates an attack from a malicious source. Mapping the possibility of an attack and what consequences it can [...]

10 10, 2016

How Exploit Kits are Attacking You while Surfing Legit Websites

By |2017-01-31T15:32:54+02:00oktober 10th, 2016|Categories: guides|Kommentarer er skrudd av for How Exploit Kits are Attacking You while Surfing Legit Websites

Exploit kits can download malicious code and malware on your computer automatically while you are surfing the Internet. In this blog post we will have a closer look at this devious form of attack. What are exploit kits?Exploit kits are tools that cyber criminals use to scan your system for vulnerabilities, exploit the [...]

22 09, 2016

Network Security Monitoring – What is it all about?

By |2017-01-31T15:34:47+02:00september 22nd, 2016|Categories: guides|Kommentarer er skrudd av for Network Security Monitoring – What is it all about?

Network security monitoring (NSM) involves collecting and analyzing data, which in turn give companies the opportunity to detect and respond to intruders in their network. In this way, companies can take action before intruders manage to accomplish their missions, and prevent further damage to the company. Network security monitoring is however not a [...]

14 09, 2016

Apps Digging into Your Privacy

By |2017-01-31T15:37:22+02:00september 14th, 2016|Categories: guides|Kommentarer er skrudd av for Apps Digging into Your Privacy

Most people have several different apps on their phones, but what do you really say yes to when downloading an app? A lot of apps extract far more information than necessary, track users without good reason, and require disproportionate rights to user content. Why should for example an e-book app have access to [...]

3 08, 2016

Frequent Password Changes Weaken Security

By |2017-01-31T19:25:30+02:00august 3rd, 2016|Categories: guides|Kommentarer er skrudd av for Frequent Password Changes Weaken Security

Did you know that frequent password changes actually weaken security? When companies force their employees to change passwords several times a year, it is likely to cause them stress and cognitive overload. To lighten the burden, employees tend to create passwords that follow predictable patterns, change a letter to a similar-looking symbol, add or [...]

8 03, 2016

3 Reasons to Invest in IT Security during Recession

By |2017-01-31T19:33:11+02:00mars 8th, 2016|Categories: guides|Kommentarer er skrudd av for 3 Reasons to Invest in IT Security during Recession

Did you know that recession in the economy is fuelling and encouraging cyber crime across the world? Cybercrime is thriving in the era of cutback and layoffs, and has now surpassed illegal drug trafficking as a criminal moneymaker. Cybercrime covers a wide range of different threats, all involving computers and networks. The most common [...]

4 02, 2016

Put Your Phishing Knowledge to the Test

By |2017-01-31T19:38:47+02:00februar 4th, 2016|Categories: guides|Kommentarer er skrudd av for Put Your Phishing Knowledge to the Test

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

24 01, 2016

Understand the Difference between Phishing and Spear Phishing

By |2017-01-31T19:44:09+02:00januar 24th, 2016|Categories: guides|Kommentarer er skrudd av for Understand the Difference between Phishing and Spear Phishing

Social engineering and spear phishing are often the primary means by which attackers infiltrate modern corporate networks. While phishing attacks have been around for a long time, spear phishing is a newer type of attack. You may have heard both terms being used, but are you familiar with the difference between the two? [...]

16 01, 2016

5 Reasons to Phish your Employees

By |2017-01-31T19:49:33+02:00januar 16th, 2016|Categories: guides|Kommentarer er skrudd av for 5 Reasons to Phish your Employees

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

13 11, 2015

OWASP ASVS – Application Security Verification Levels

By |2017-01-24T18:40:28+02:00november 13th, 2015|Categories: guides|Kommentarer er skrudd av for OWASP ASVS – Application Security Verification Levels

In this blog post we will have a look at the OWASP Application Security Verification Standard (ASVS) levels. OWASP ASVS is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, and even consumers to define what a secure application is. If you are not familiar [...]