guides

20 01, 2017

Why Should Software Suppliers Conduct Security Testing?

By |2023-05-05T13:02:45+02:00January 20th, 2017|Categories: guides|Comments Off on Why Should Software Suppliers Conduct Security Testing?

Most software suppliers are highly skilled at what they do. Their developers are experts at building systems, and making things work. Hackers do however have a completely different mindset. Their focus are on how to break things, and on how to exploit functionality in systems. Because of this, software suppliers can benefit from conducting [...]

12 01, 2017

How Much Does a Network Security Test Cost?

By |2023-05-05T13:02:53+02:00January 12th, 2017|Categories: guides|Comments Off on How Much Does a Network Security Test Cost?

Cyber attacks are a risk for all businesses, regardless of size. A security test can reveal if your security measures can withstand external threats, and whether they are adequate and functioning correctly. Effective network security testing simulates an attack from a malicious source. Mapping the possibility of an attack and what consequences it can [...]

10 10, 2016

How Exploit Kits are Attacking You while Surfing Legit Websites

By |2017-01-31T15:32:17+02:00October 10th, 2016|Categories: guides|Comments Off on How Exploit Kits are Attacking You while Surfing Legit Websites

Exploit kits can download malicious code and malware on your computer automatically while you are surfing the Internet. In this blog post we will have a closer look at this devious form of attack. What are exploit kits?Exploit kits are tools that cyber criminals use to scan your system for vulnerabilities, exploit the [...]

22 09, 2016

Network Security Monitoring – What is it all about?

By |2022-05-04T09:55:44+02:00September 22nd, 2016|Categories: guides|Comments Off on Network Security Monitoring – What is it all about?

Network security monitoring (NSM) involves collecting and analyzing data, which in turn give companies the opportunity to detect and respond to intruders in their network. In this way, companies can take action before intruders manage to accomplish their missions, and prevent further damage to the company. Network security monitoring is however not a [...]

14 09, 2016

Apps Digging into Your Privacy

By |2017-01-31T15:35:50+02:00September 14th, 2016|Categories: guides|Comments Off on Apps Digging into Your Privacy

Most people have several different apps on their phones, but what do you really say yes to when downloading an app? A lot of apps extract far more information than necessary, track users without good reason, and require disproportionate rights to user content. Why should for example an e-book app have access to [...]

4 08, 2016

Frequent Password Changes Weaken Security

By |2022-05-04T09:56:06+02:00August 4th, 2016|Categories: guides|Comments Off on Frequent Password Changes Weaken Security

Did you know that frequent password changes actually weaken security? When companies force their employees to change passwords several times a year, it is likely to cause them stress and cognitive overload. To lighten the burden, employees tend to create passwords that follow predictable patterns, change a letter to a similar-looking symbol, add or [...]

8 03, 2016

3 Reasons to Invest in IT Security during Recession

By |2022-05-04T09:56:31+02:00March 8th, 2016|Categories: guides|Comments Off on 3 Reasons to Invest in IT Security during Recession

Did you know that recession in the economy is fuelling and encouraging cyber crime across the world? Cybercrime is thriving in the era of cutback and layoffs, and has now surpassed illegal drug trafficking as a criminal moneymaker. Cybercrime covers a wide range of different threats, all involving computers and networks. The most common [...]

4 02, 2016

Put Your Phishing Knowledge to the Test

By |2022-05-04T09:56:49+02:00February 4th, 2016|Categories: guides|Comments Off on Put Your Phishing Knowledge to the Test

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

24 01, 2016

Understand the Difference between Phishing and Spear Phishing

By |2022-05-04T09:57:09+02:00January 24th, 2016|Categories: guides|Comments Off on Understand the Difference between Phishing and Spear Phishing

Social engineering and spear phishing are often the primary means by which attackers infiltrate modern corporate networks. While phishing attacks have been around for a long time, spear phishing is a newer type of attack. You may have heard both terms being used, but are you familiar with the difference between the two? [...]

16 01, 2016

5 Reasons to Phish your Employees

By |2022-05-04T09:57:29+02:00January 16th, 2016|Categories: guides|Comments Off on 5 Reasons to Phish your Employees

Social engineering and phishing are often the primary means by which attackers infiltrate modern corporate networks. By using this non-technical method that relies heavily on human interaction, attackers try to trick employees into providing them with valuable information, or taking action needed for making a successful intrusion. This makes social engineering one of today’s [...]

Go to Top