U

Data diodes – an effective alternative to air gaps

Data diodes – an effective alternative to air gaps

Do you have sensitive systems or sensitive data that needs to be protected? Have you chosen not to connect the systems to the outside world, i.e. have you used air gaps as your solution? Reconsider! There is an alternative to air gaps that is more secure and more...
How to secure your logging

How to secure your logging

Centralised logging in security-sensitive systems involves an enhanced risk of attacks. To reduce the risks, a solution is needed that protects both log data and all connected systems. In this blog post, we will provide you with a solution to how you can secure your...
How to Conduct Secure Updates

How to Conduct Secure Updates

Updates for Windows and Linux systems are an important part of maintaining the security of the digital information in these systems. However, the updates themselves may be a security risk – to avoid these risks and to maintain the integrity and availability of...
How to achieve secure remote access

How to achieve secure remote access

Many organisations depend on remote access through RDP, for example to allow suppliers to perform maintenance, or so that operating personnel can monitor and control a system. Secure remote access solves many of the security risks that are otherwise associated with...
Stay secure during the summer

Stay secure during the summer

Summer is a time for sun, swimming, and relaxation. But not everyone rests during summer – the summer season is a time when many attackers strike, as many businesses wind down for vacation time. Fewer employees are on site to keep an eye on the systems, there might be...