by Ymir Vigfusson | Feb 5, 2024 | Publication
Phishing attempts are a prevalent form of cybercrime that often go undetected until it’s too late. In order to protect yourself and your sensitive information, it’s crucial to be able to recognize the common indicators of a phishing attempt. By...
by Árni Thor Árnason | Sep 28, 2023 | Publication
Data is the lifeblood, the thumbprint, the essential organs of your organization. It’s what differentiates you from competitors, what informs decision-making, and what results from all of the hard work your company executes over the years. Data is the most valuable...
by Ymir Vigfusson | Sep 21, 2023 | Publication
When it comes to protecting critical systems, few adversaries are as cunning as spear phishers. These crafty cybercriminals don’t cast their nets wide like your run-of-the-mill phisher. Instead, they target you specifically, armed with personalized information...
by Árni S. Pétursson | Sep 20, 2023 | Publication
In today’s digital world, securing your business data and sensitive information is paramount. Instances of high profile data breaches are more rampant than ever, while the technology used to bolster against attacks range from less than ideal to completely...
by Árni Thor Árnason | Aug 17, 2023 | Publication
It’s high time to finally accept that users will get hacked and thus organizations will get hacked — so what next? This is the founding principle of zero trust, a concept that is steadily gaining traction in the ever-evolving world of cybersecurity: But what exactly...
by Ymir Vigfusson | Aug 10, 2023 | Publication
In the fast-paced digital landscape, security remains a top priority for businesses of all sizes. But as cyber threats become increasingly sophisticated, traditional authentication methods like multifactor authentication (MFA) or two-factor authentication (2FA) may...