What is ransomware?
What can the effects be when you are struck by a ransomware attack? And what can be done to minimise the consequences?
Data diodes - an effective alternative to air gaps
Have you chosen not to connect the systems to the outside world using air gaps? There are other solutions that are more secure and more cost-effective.
The cyber threats to critical infrastructure operational technology (OT) – how to protect your operations
The threats to critical infrastructure are constantly increasing and therefore systematic work with concrete cybersecurity measures is vital.
How to secure your logging
To reduce the risks of centralised logging, a solution is needed that protects both log data and all connected systems.
How to conduct secure updates
Avoid security risks with updates by using the right security solutions.
How to achieve secure remote access
Many organisations depend on remote access through RDP, for example to allow suppliers to perform maintenance or for operating personnel for monitoring.
Stay secure during the summer
Summer season is a time when many attackers strike, as many businesses wind down for vacation time. We give you 5 tips and a simple summer security checklist!
7 tips to strengthen the security of your supply chain
Because they can be both devastating and have far-reaching consequences, all businesses simply need to review the security of their supply chain.
What types of data diodes are there?
In this blog post, we will discuss the different data diodes that Advenica offers and how these can be used with or without software.
The only constant is that things change - the way cyber threats have evolved
Håkan Ahrefors, IT manager and security specialist at Advenica, reflects about the development of cyberattacks.
Digitalisation vs. security
Digitalisation has made our everyday life easier. But is security keeping up at the same pace so that we can trust that our digital services are safe?
The history of malware
The history of malware goes back further than most might think. We have listed some of the most significant ones in history so far!
NIS 2 has been published
The NIS 2 directive is now published, and the countdown has begun for the deadline that organisations in the EU must adopt the directive.
Trend scouting in cybersecurity
We have asked three of our cybersecurity experts to comment on trends for the new year. What do they think will happen in cybersecurity in 2023?
Segmentation – the constant security solution
A solution that has existed for a long time, and is still a secure approach today, is segmentation.
How to avoid sanctions from NIS 2
NIS 2 means that there will be a risk of large fines if requirements are not met. So how do you ensure that your organisation will not be hit by the sanctions?
3 security problems that authorities can solve with the help of data diodes
Authorities are increasingly exposed to various types of cyberattacks. To protect yourself, you need to raise the level of cybersecurity work.
What is The Cyber Resilience Act?
In this blog post, we will clarify what the Cyber Resilience Act is and what impact it will have.
What is logical separation?
In this blog post, we will explain what logical and physical separation is and what the perks are.
What can a lack of information security lead to?
In this blog post, we will explain the consequences of inadequate information security.
Increased security for wind turbines
In an increasingly unstable world, we are seeing more and more attacks on critical infrastructure.
New proposed directive - NIS 2
There is a proposal for a new directive which originates from the NIS directive – this new proposed directive is called NIS 2.
NIS, GDPR and the Protective Security Act – what is the difference between them?
In this blog post, we will explain a handful of recently introduced security laws and regulations, and what sets them apart from each other.
Building cyber resilience
ENISA and CERT-EU have listed a number of recommendations that all should follow for better cyber resilience – we have elaborated on two on them!
What a data diode can spare you
Some might hesitate to invest in cybersecurity. We will explain what a data diode can spare you!
How management can organise their business to avoid cyberattacks
In this blog post, we have listed a few things to consider to be able to avoid being affected by cyberattacks!
Lack of competence in cybersecurity - a matter for management
The need for competencies and competence in cybersecurity is constantly increasing. But, there is a shortage of competence.
Is your network isolation leaking?
What if there was a leak in the network that you thought was isolated? Information security is more important than ever and requires structured work.
How can energy companies become less vulnerable?
With more frequent and increasingly vicious cyberattacks, vulnerabilities in IT architecture pose a severe threat for energy companies.
5 tips for how you better can protect yourself against cyberattacks
In this blog post, we describe 5 important tips you should be aware of to better protect yourself against cyberattacks!
Why CISOs should work with Cyber Risk Quantification (CRQ)
Cyberattacks are constantly increasing. Because of this, there is an increasing need for cyber risks to be measured and reported in financial terms.
Retailers new targets for cyberattacks
Many recent cyberattacks have been targeted at retailers who are becoming increasingly more vulnerable.
Log4j and Log4Shell – how can you protect yourself?
In December 2021, a vulnerability was found in the Java module Log4j. There are ways to protect yourself against this type of vulnerability!
What is the best way to protect your network?
We explain the functionalities of three solutions that can protect your network, so that you can better understand what might be the best one for you!
This is why you base your zoning on risk analysis
In this text, we explain in detail what is important to keep in mind when basing your zoning on risk analysis according to IEC 62443.
IIoT and Industry 4.0 security challenges
To avoid the risk of opening up for cyberattacks, industries and enterprises adopting IIoT have to increase the level of protection.
The security risks the CISO needs to be aware of
A CISO needs to be aware of a lot to avoid that the vulnerabilities are exploited for a cyberattack. We describe six security risks that you should be aware of!
A stricter Protective Security Act: 3 things the CISO needs to consider
The new, stricter Protective Security Act will enter into force on December 1st 2021, if the proposal passes. The CISO needs to be prepared!
CISO – How you make sure that the management team prioritises cybersecurity
It is not always easy for the CISO to explain to the management team why working with cybersecurity is so important. Here are some things to keep in mind!
IEC 62443 – a standard you should know if you work with security in ICS systems
We explain what the standard IEC 62443 covers and what you need to think about if you want to follow it!
Securely integrate IT/OT – learn how to do it step by step!
We have listed 5 steps for how to securely integrate IT/OT. The method is based on the standard IEC 62443 – a must for those who work with security within OT.
How insurance companies protect critical and personal information
It is highly necessary that insurance companies protect critical and personal information with appropriate cybersecurity solutions.
Security expert: How to handle the old and new threat of a software attack
Sami Hyytiäinen, technical expert, explains how to handle a software attack and how secure updates can be managed with the right solutions.
2 important pieces of advice on how society can become less vulnerable to IT attacks
Media has been flooded with news of IT attacks affecting large sections of society - we give some piece of advice on how the attack could have been limited.
How the process industry can handle today’s security threats
The process industry is regularly subjected to attacks – therefore, we have gathered some advice on how the process industry can protect their control systems.
5 things about cybersecurity you have not thought about
We present 5 things about cybersecurity that you might not have thought about, that will give you an advantage when working with cybersecurity!
Why invest in cybersecurity?
The reasons to invest in cybersecurity vary from organisation to organisation. What matters is that you know the level of protection your organisation needs!
Why you should secure your network with more than a firewall
In order to protect what is most sensitive and critical to operations, you should secure your network with more than a firewall!
Increase security for your OT systems
Since the information in OT systems is very important for the company that uses the system, and sometimes important for the whole society, it must be protected.
How to work with network segmentation using zoning
We have defined 5 steps for network segmentation using zoning, and hope that these can guide you and help create a successful project!
How to make your data center secure with cybersecurity solutions
It can be a challenge to run and operate data centers. There are a number of threats that need to be mitigated with the right security solutions.
How do we acquire high assurance?
It is difficult to measure security - this is the reason why we prefer to talk about assurance, rather than security.
Protecting Banks’ Sensitive Information
Cyberattacks are a constant threat to organisations - for banks, it is important to have in mind as they handle sensitive information.
The 5 Most Increasing Types of Cyber Threats
A report by the European Union Agency for Cybersecurity (ENISA) shows that five different cyber threats in particular are increasing in Europe.
How you can easily ensure one-way communication between two networks
Many networks require extra protection against tampering and data leakage. In these cases, a data diode can be very useful!
How to Use Network Segmentation to Follow Proposed Regulations Concerning Information Security for Water Suppliers
There is now a proposal for mandatory adjustments in Livsmedelsverket’s regulations on information security for socially important services.
Use data diodes to protect information in critical infrastructure
Data Diodes are the failsafe way to protect your sensitive systems and confidential data.
How to Conduct Secure Updates
Conducting updates is something that can be a security risk if not done properly. Learn how to conduct secure updates in this blog post!
Protect your SCADA Environment from Weaknesses
Vulnerabilities in protocol gateways can result in serious cybersecurity attacks. The right solutions are needed to secure your SCADA environment.
Data diodes raise cybersecurity for banks
Segmentation using data diodes is an essential measure to mitigate security risks for banks
Why Vienna chose Advenica’s Data Diodes to protect its energy infrastructure
Read our customer case and learn how Wiener Netze in Vienna uses Advenica’s Data Diodes for protection
Secure information management for ICS systems
Secure information management for ICS systems is one of the most challenging areas for companies using them.
How to do a secure transfer of SCADA information
The processes that SCADA systems control, and monitor are often of very sensitive nature - and special solutions are needed to get a secure transfer.
Security in a future of IoT based on 5G
How does security work In a future of IoT in a 5G world? Here are some important things to consider.
Cybersecurity trends for 2020
We have noted a few trends within cybersecurity for 2020 that we want to share.
How to get started with information security work?
The digital world places new, higher demands on information security. Do you know how to start working with information security?
How the energy sector can secure power and a functioning society
With more frequent and increasingly vicious cyberattacks, vulnerabilities in IT architecture pose a severe threat.
Security culture - an important part of cybersecurity
Cybersecurity today is not only a technical challenge but also a human challenge - a matter of security culture.
Lack of cybersecurity awareness in the oil & gas industry – a major risk for the environment
A cyberattack on oil and gas control systems can result in severe consequences to human safety and the environment.
How municipalities keep citizens’ integrity and privacy safe
The only way to protect digital communication and not fall victim to these attacks is to work with cybersecurity in a consistent and structured way.
Information security compliance – five business benefits
Information security compliance brings significant benefits to you and your business!
How you secure the management's commitment to information security
Here are a few things you should bring to a presentation for the management regarding information security.
Is your security solution future-proof?
Do you know how future-proof the solution you choose to invest in actually is? Who is responsible if your solution is hacked in a few years?
The NIS directive - we can help you comply
How is the NIS work progressing in your organisation? Have you started to work for compliance with all the requirements?
How does your organisation secure information security in ICS and SCADA systems?
How to ensure information security while maintaining the accessibility and integrity of the systems?
Know how to do secure file transfer to classified networks?
We have a solution that provides strong protection for file transfers.
Feel in control regarding the NIS directive?
Do you know how to work systematically with information security?
Is your organisation protected from being hacked?
The data intrusions are constantly increasing. Does your organisation have the right protection?
Cyber-attacks – part of our everyday lives
Advanced cyber-attacks from various directions, even from state attackers in other countries, are today unfortunately part of our everyday life.
When a firewall is not enough
What do you do to protect your organisation’s network and information flow? What solution do you use and depend on?
What is a data diode and how does it work?
A data diode is a cybersecurity solution that makes sure that information can only travel in one direction.
The defence needs trusted cybersecurity solutions – do you?
The defence industry requires high assurance solutions - Every step in the development, from design to the aftermarket, must be controlled to ensure this
Maintain security, even when working remotely!
How do you ensure that remote access does not open more possible attack vectors for a potential attacker?
Four reasons to invest in future-proof solutions today
For those of you responsible for critical infrastructure, we have compiled some talking points so you can make responsible and sustainable decisions.
The cyber year of 2019 and what’s to come
Jonas Dellenvall, CTO at Advenica, shares his view on the security year ahead of us.
Five steps to controlled remote access with RDP
We give you 5 steps to take control over remote access
Are you protecting the right things?
Protecting all the information flow in a company today at the same level is not possible - so how to do it right?
All clouds are not made equal – five questions to ask your cloud service provider
Are cloud services secure? Here are five questions to ask your cloud service provider.
Five key facts in the Quantum Age
Quantum computers and quantum technology is coming - here five key facts in the quantum age.
Can we trust what we “know” about cybersecurity?
When misconceptions (or rather myths) about cybersecurity are circulating freely, how do we know what to trust?
Are we taking cybersecurity seriously enough?
So how is it that we believe we know all about cybersecurity? Are we just being naïve?
The story of the Trojan Horse from an IT security perspective
The legend of the Trojan horse - and a parallel to existing problems with modern technology for IT security.
Eliminate insider threats and data leakage once and for all
Three Domain Separation is a unique technique enabling centralised control with no risk of administrators gaining access to business critical information.
Network segmentation – fundamental for information security
Why is network segmentation required?
Today's security situation requires a military cyber approach
An increasing number of businesses need the kind of effective protection previously only used by defense forces and intelligence agencies
Cybersecurity challenges in 2018
Advenica’s CTO Jonas Dellenvall and CEO Einar Lindquist talk about what’s happening in cybersecurity in 2018.
Low maturity and readiness to cope with cyber threats
A summary of Swedish IT Security Index 2.0 shows some scary insights that can have importance for the security of society and our ability to resist cyberthreats
The perfect storm is on its way. Who cares?
The "Weather Forecast" for critical infrastructure is that the perfect storm will be triggered in May 2018.
Are fiber optics secure?
Optical fibers are used in fiber-optic communications over long distances and at high bandwidth. But, are they secure?