Blog

2022: An evolving cybersecurity landscape

As we move to the conclusion of 2021, CEO John Vestberg takes a look at the cybersecurity trends he sees developing in 2022. Some new, some heard before but remaining just as vital, organisations are facing an avalanche of cyber threats which are placing data and reputations at risk. Keeping your cloud safe and sound…
Read more

Another day, another data leak: Fortinet and the security lessons learned

In September this year, network security solutions provider Fortinet, suffered a data leak which exposed VPN login names and passwords. The exact number of credentials isn’t known. Fortinet said in a blog post that 87,000 had been impacted, while publication Bleeping Computer put the number at half a million. According to Fortinet, the credentials were…
Read more

Server racks

The top three priorities companies should consider when planning a cybersecurity strategy

If the past year has taught us anything, it’s that no corners can be cut when it comes to cybersecurity strategies. There have been over 65,000 cyberattacks in the past 12 months, some of them hugely detrimental such as the major Colonial Pipeline attack which cost the company a staggering $5 million ransom and triggered…
Read more

John Vestberg’s thoughts provide a beacon of clarity through JBS ransomware attack

In June 2021, JBS, the world’s largest meat production firm, was subject to a huge ransomware attack which impacted customers in the US and Australia. The Brazilian-based organisation was targeted by the cybercriminal gang, REvil. The Russian group encrypted all JBS’ files and completely disrupted operations with all activity as its US and Australian plants…
Read more

The Devil’s in the Details

The 5G Huawei ban is not enough. To protect our networks and critical infrastructure from harm, far more needs to be done writes telecoms expert Stefan Brodin. 5G networks are starting to be rolled out across Europe and the rest of the world. It’s said to be a technological revolution that will transform industries and…
Read more

The Art of Cyberwar

2 500 years ago, the general and military strategist Sun Tzu wrote the book The Art of War. It is a classic book on military strategy which is still being referenced at military schools around the world.   Let’s reflect on what has changed since then. Are Sun Tzu’s wisdoms still relevant? One major difference is technology and weapons, which of course…
Read more

World Password Day Signals Perfect Time to Reveal Clavister EasyAccess 3.2

Each year on the first Thursday in May, World Password Day promotes better password habits. Passwords are critical gatekeepers of our digital identities, allowing us to access online shopping, dating, banking, social media, private work, and life communications. Passwords are critical to our digital life, yet we are extremely poor at remembering good versions of them.…
Read more

How to Remote Work Like a Boss

With remote working becoming our new normal, there are a few things you need to do to be safe and effective. Some professions like nurses, firefighters, mailmen and clerks will not be able to change to a ”work-from-home” mode as the world around us changes. However, a large number of us have the luxury to…
Read more

How Tech Will Beat COVID-19

With medical research desperately searching for a cure to the Corona crisis, what may be our best hope in the meantime is for technology to save the day. Here’s how… By now we’ve all become almost fatigued with the news cycle’s daily curves that grimly tell the tale of our times. That the COVID-19 virus…
Read more

How protected are you?

From the biggest banks to your company’s network, having an overview of security helps you see the obvious points of exploitation. The Antwerpen Diamond Center was supposed to be impenetrable. The vault itself was protected by ten impregnable layers of security including magnetic, light and heat sensors; infrared motion detectors and seismic detection warnings as…
Read more