by Ymir Vigfusson | Mar 4, 2024 | Publication
Protecting yourself from social engineering is more crucial than ever. Social engineering is a form of manipulation used by cyber attackers to exploit human psychology and gain unauthorized access to personal information or sensitive data. Understanding social...
by Árni Thor Árnason | Feb 29, 2024 | Publication
In today’s digital era, cloud technology has become an essential part of businesses. It allows organizations to store and access their data remotely, providing convenience and flexibility. However, with this convenience comes the risk of cloud data loss. Losing...
by Ymir Vigfusson | Feb 27, 2024 | Publication
Phishing emails have become a common and persistent threat in today’s digital world. While they may vary in their approach and techniques, there are certain characteristics that virtually all phishing emails share. By understanding these commonalities,...
by Árni S. Pétursson | Feb 26, 2024 | Publication
Stop stealthy hackers where other security systems can’t Keep hackers out of your life Remote Desktop Protocol (RDP) servers have become increasingly popular for remote access to computers and networks. However, with their widespread adoption comes the inherent...
by Ymir Vigfusson | Feb 17, 2024 | Publication
Phishing attacks have become an all too familiar threat in today’s digital world. In recent years, however, a new breed of cyber attack has emerged, known as spear phishing. While similar in nature, spear phishing attacks are more targeted and sophisticated than...
by Ymir Vigfusson | Feb 14, 2024 | Publication
Traditional methods of authentication are no longer sufficient. Hackers have become adept at exploiting vulnerabilities in static password-based systems, leaving users and their valuable data at risk. To address this challenge, a new approach called continuous...