by johanna | Feb 21, 2024 | Blog
Investing in sufficiently high security is never a mistake as it is more expensive to be exposed to a cyberattack. But it can, for different reasons, be a challenge to convince management to invest in security. It is sometimes wrongly considered to be both expensive...
by johanna | Feb 7, 2024 | Blog
Many may think that data diodes are expensive, but the truth is that they are a simple and effective solution for protecting your most important information or systems – assets that would ultimately cost more to lose control of during a cyberattack. In this blog post,...
by johanna | Jan 31, 2024 | Blog
Have you already secured your IT/OT integration? Congratulations! Then you have an advantage over many others, and you also have the opportunity to do several things that those who have not secured their IT/OT integration cannot even think of doing. All you can do if...
by johanna | Jan 19, 2024 | Blog
In October, only a few months from now, NIS 2 will become law and authorities will be able to perform audits to see if organisations are compliant. Our advice is to start preparing now, even if it is not yet established exactly what NIS 2 will mean for your country’s...
by johanna | Jan 18, 2024 | Solution descriptions
A common need in a segmented network environment is to import and export files between different zones. File transfer and file sharing is done both between people and machines, using several different technologies depending on the environment. However, file transfer...