Table of contents: What is an IT security audit? Types of IT audits and their significance How does an IT audit work? Example process When should you consider an IT audit? IT audit – should you conduct it yourself? Key benefits of performing an IT audit What is an IT...
Blog
Red Team – what is it and how does Red teaming work?
Red Team – what is it and how does Red teaming work? Cybersecurity is a rapidly evolving field. With new technologies, constantly changing network architectures, and increasingly complex operating systems, cybercriminals are continuously adapting their tactics. This...
OSINT: Open Source Intelligence – A Key Tool in Cybersecurity
Table of Contents What is OSINT (Open Source Intelligence)? Why is OSINT used? Who regularly uses OSINT data? Applications of OSINT in cybersecurity OSINT Tools Technologies Supporting OSINT Data Collection Key Benefits of Using OSINT in Cybersecurity What is OSINT...
Gearing up for safe remote work
Given the current COVID-19 pandemic, many people are considering working from home. Some of them will probably take home a business laptop, which has been prepared by the IT Department. From a cybersecurity standpoint, this is the best option: the employee takes home...
Social engineering techniques used by hackers
“If the door is locked, try the window” — that’s the motto, used by more and more cybercriminals, unfortunately, successful. Just replace “the door” with “the system security” and “the window” — with employees. Today we will talk about techniques that hackers use to...
Mobile security in a business environment
Whether we like it or not, BYOD (Bring Your Own Device) is here to stay. Long-gone are the days of IT managers making company-wide decisions when it comes to preferred mobile platforms. Today almost everyone uses their own mobile device in a work environment – whether...