U

Securely restoring backups after a cyberattack

Securely restoring backups after a cyberattack

Recovering from a cyberattack is a high-stakes process for any IT organisation. After an incident such as ransomware or malware infections, restoring systems from backup is often the quickest way to regain operational stability. However, blindly restoring backups...
Secure file import from user portals

Secure file import from user portals

Portals are often used both for external and internal sharing and collecting of various types of information. Such portals are natural hubs between potentially large numbers of different parties and therefore present an effective attack vector for spreading malicious...
How to securely import updates into secure production environments

Importing updates into secure production environments

To remain efficient and secure, systems must be updated regularly. For secure production environments, updates can also pose a risk of malware entering the systems. To make sure the update import is secure, special solutions are needed. Importing software updates...
Securing information flows in an IT/OT environment

Securing information flows in an IT/OT environment

The need to connect IT and OT has grown with the digitalisation of production processes. Buthow do you secure this information flow and avoid exposing your systems to cyberattacks? Secure information flow in an IT/OT environment It has become increasingly important to...