by Petra | Oct 24, 2023 | Blog
Do you have sensitive systems or sensitive data that needs to be protected? Have you chosen not to connect the systems to the outside world, i.e. have you used air gaps as your solution? Reconsider! There is an alternative to air gaps that is more secure and more...
by Petra | Oct 20, 2023 | Blog
Critical infrastructure operations are vital to our society as they provide essential services such as electricity, telecommunications, transport, drinking water and so on. The threats to this sector are constantly increasing and therefore systematic work with...
by Petra | Sep 12, 2023 | Blog
Centralised logging in security-sensitive systems involves an enhanced risk of attacks. To reduce the risks, a solution is needed that protects both log data and all connected systems. In this blog post, we will provide you with a solution to how you can secure your...
by johanna | Aug 30, 2023 | Blog
Updates for Windows and Linux systems are an important part of maintaining the security of the digital information in these systems. However, the updates themselves may be a security risk – to avoid these risks and to maintain the integrity and availability of...
by Petra | Aug 15, 2023 | Blog
Many organisations depend on remote access through RDP, for example to allow suppliers to perform maintenance, or so that operating personnel can monitor and control a system. Secure remote access solves many of the security risks that are otherwise associated with...
by johanna | Jun 21, 2023 | Blog
Summer is a time for sun, swimming, and relaxation. But not everyone rests during summer – the summer season is a time when many attackers strike, as many businesses wind down for vacation time. Fewer employees are on site to keep an eye on the systems, there might be...