Selecting a new Password Manager
I am also one of those users that used LastPass until a few days ago with full satisfaction. A breach can happen to anyone, but by leaving customers in the dark and exposed is especially worrying. By not giving insight who, what and where customers…
Hardening – VM Security
The last decade virtualization has been rapidly adopted by almost any organization in the world and became a standard industry practice. You may deploy Veeam Backup & Replication components as either a physical or virtual server. For most organizations, virtual is the recommended deployment for…
Hardening – Infrastructure Security
Hardening the Infrastructure Security are the security measures provided to protect the infrastructure, especially critical infrastructure. While looking into the infrastructure a lot of organizations have already a high rate of virtualization established. Hypervisor hosts are critical infrastructure components at almost any organization, because a…
Hardening – Segmentation
Ultimately, all security is about protecting a valuable asset and reducing risk – in this case it is Data – but that protection involves a defence-in-depth strategy that includes all layers. To do a defence-in-depth, you should identify the most valuable data and build layers of defence…
Hardening – Hardware Security
To prevent outside interference and tampering with the physical hardware several measures should be taken into consideration. By taking the correct measures ensures that you can trust your deployed computing platform, and it adds security to server hardware and operating systems from the moment you…
Hardening – Physical Security
It is essential that only authorized personnel have physical access to the datacenter. Data centers hold sensitive and crucial information and services. Software-based protections on your server(s) become far less effective or even useless as soon as an attacker gains physical access! Access into a…
Infrastructure Hardening
Cyber Security is something nobody can afford to ignore anymore. Hacks and data breaches regularly affect organizations of all sizes. Often these incidents are significant enough to make the front pages, causing irreparable reputational damage to the organizations involved. Keeping today’s digital assets available 24/7…