by Árni Thor Árnason | Feb 6, 2024 | Publication
Remote Desktop Protocol (RDP) has become an essential tool for remote access to computers and servers. It allows users to connect to a remote system as if they were physically present, enabling seamless collaboration and efficient working practices. However, despite...
by Ymir Vigfusson | Feb 5, 2024 | Publication
Phishing attempts are a prevalent form of cybercrime that often go undetected until it’s too late. In order to protect yourself and your sensitive information, it’s crucial to be able to recognize the common indicators of a phishing attempt. By...
by Árni Thor Árnason | Sep 28, 2023 | Publication
Data is the lifeblood, the thumbprint, the essential organs of your organization. It’s what differentiates you from competitors, what informs decision-making, and what results from all of the hard work your company executes over the years. Data is the most valuable...
by Ymir Vigfusson | Sep 21, 2023 | Publication
When it comes to protecting critical systems, few adversaries are as cunning as spear phishers. These crafty cybercriminals don’t cast their nets wide like your run-of-the-mill phisher. Instead, they target you specifically, armed with personalized information...
by Árni S. Pétursson | Sep 20, 2023 | Publication
In today’s digital world, securing your business data and sensitive information is paramount. Instances of high profile data breaches are more rampant than ever, while the technology used to bolster against attacks range from less than ideal to completely...
by Árni Thor Árnason | Aug 17, 2023 | Publication
It’s high time to finally accept that users will get hacked and thus organizations will get hacked — so what next? This is the founding principle of zero trust, a concept that is steadily gaining traction in the ever-evolving world of cybersecurity: But what exactly...