by Ymir Vigfusson | Jun 4, 2024 | Publication
At Keystrike nothing is more important to us than customer success, and success is built upon trust. In order to help our customers secure remote desktop connections, we must have stringent security practices internally. To demonstrate our commitment to the highest...
by Ymir Vigfusson | Apr 25, 2024 | Publication
Lateral movement is a stealthy and dangerous technique employed by cybercriminals to infiltrate and exploit secure networks. As organizations continue to strengthen their cybersecurity measures, it becomes imperative to understand the intricacies of lateral movement...
by Ymir Vigfusson | Apr 7, 2024 | Publication
Remote desktop protocol (RDP) has become an integral part of modern computing. It allows users to connect to and control remote computers, providing seamless access to resources and applications. However, with the increasing reliance on RDP, the security of this...
by Ymir Vigfusson | Mar 18, 2024 | Publication
The commonly known term social engineering refers to the act of manipulating people to gain access to confidential information or to influence their behavior. While traditional social engineering involves the attacker posing as someone else to deceive the target,...
by Ymir Vigfusson | Mar 8, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, organizations need to adopt a proactive approach to network security. One such approach that has gained popularity is the concept of Zero Trust. This article explores the use cases of Zero Trust and provides...