by Ymir Vigfusson | Mar 18, 2024 | Publication
The commonly known term social engineering refers to the act of manipulating people to gain access to confidential information or to influence their behavior. While traditional social engineering involves the attacker posing as someone else to deceive the target,...
by Ymir Vigfusson | Mar 8, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, organizations need to adopt a proactive approach to network security. One such approach that has gained popularity is the concept of Zero Trust. This article explores the use cases of Zero Trust and provides...
by Árni Thor Árnason | Mar 6, 2024 | Publication
MFA, or Multi-Factor Authentication, has become an integral part of our digital lives. It provides an added layer of security, requiring users to go through multiple steps to verify their identities. While MFA is undoubtedly beneficial, it is not without its...
by Ymir Vigfusson | Mar 4, 2024 | Publication
Protecting yourself from social engineering is more crucial than ever. Social engineering is a form of manipulation used by cyber attackers to exploit human psychology and gain unauthorized access to personal information or sensitive data. Understanding social...
by Árni Thor Árnason | Feb 29, 2024 | Publication
In today’s digital era, cloud technology has become an essential part of businesses. It allows organizations to store and access their data remotely, providing convenience and flexibility. However, with this convenience comes the risk of cloud data loss. Losing...
by Ymir Vigfusson | Feb 27, 2024 | Publication
Phishing emails have become a common and persistent threat in today’s digital world. While they may vary in their approach and techniques, there are certain characteristics that virtually all phishing emails share. By understanding these commonalities,...
by Árni S. Pétursson | Feb 26, 2024 | Publication
Stop stealthy hackers where other security systems can’t Keep hackers out of your life Remote Desktop Protocol (RDP) servers have become increasingly popular for remote access to computers and networks. However, with their widespread adoption comes the inherent...
by Ymir Vigfusson | Feb 17, 2024 | Publication
Phishing attacks have become an all too familiar threat in today’s digital world. In recent years, however, a new breed of cyber attack has emerged, known as spear phishing. While similar in nature, spear phishing attacks are more targeted and sophisticated than...
by Ymir Vigfusson | Feb 14, 2024 | Publication
Traditional methods of authentication are no longer sufficient. Hackers have become adept at exploiting vulnerabilities in static password-based systems, leaving users and their valuable data at risk. To address this challenge, a new approach called continuous...
by Árni Thor Árnason | Feb 13, 2024 | Publication
From customer information to valuable corporate secrets, data plays a critical role in the success of organizations across industries. However, the increasing reliance on data also comes with inherent risks. Data loss can lead to severe consequences for businesses,...