5 tips for writing Hardening Documents
One of the most tedious Payment Card Industry Data Security Standard (PCI DSS) requirements is Requirement 2.2. It involves system hardening, which ensures system components are strengthened as much as possible before network implementation. A hardening document is...
How to create ‘Strong Passwords’ that you actually can Remember?
Passwords have always been a weak point in security, but things are changing for the better. Recent studies shows that users and enterprises are taking this step seriously. Password habits are improving but improvement is still needed. We see frequently that passwords...
How can Companies Prepare for GDPR?
Set to be enforced from May 2018, the General Data Protection Regulation (GDPR) will place stringent demands on the way organisations handle personal data from European residents. The May deadline for GDPR compliance may seems like a long way off, but given the...
Adopting the cloud paradigm to practical security
In the last years, we have seen cloud technologies evolve to a mature part of any modern IT infrastructure. Organizations either already made the transition to cloud platforms or they are considering moving infrastructure to a cloud-enabled environment. As the...
How can small businesses protect themselves from a cyber attack?
Cyber attacks. We’re all hearing about them; we read about them daily and many of us have experienced them. Every day, they become a starker reality for all businesses and organizations – no matter the industry or size. Governments, business leaders, and...