by Ymir Vigfusson | Jun 4, 2024 | Publication
At Keystrike nothing is more important to us than customer success, and success is built upon trust. In order to help our customers secure remote desktop connections, we must have stringent security practices internally. To demonstrate our commitment to the highest...
by Ymir Vigfusson | Apr 25, 2024 | Publication
Lateral movement is a stealthy and dangerous technique employed by cybercriminals to infiltrate and exploit secure networks. As organizations continue to strengthen their cybersecurity measures, it becomes imperative to understand the intricacies of lateral movement...
by Árni Thor Árnason | Apr 16, 2024 | Publication
Cybercriminals employ various methods and techniques to exploit vulnerabilities and gain unauthorized access to sensitive information. Two commonly used tactics are social engineering and phishing. While they may seem similar, it is crucial to understand the...
by Ymir Vigfusson | Apr 7, 2024 | Publication
Remote desktop protocol (RDP) has become an integral part of modern computing. It allows users to connect to and control remote computers, providing seamless access to resources and applications. However, with the increasing reliance on RDP, the security of this...
by Árni Thor Árnason | Mar 21, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, and one of the methods employed to achieve social engineering is through exploiting MFA (Multi-Factor Authentication) fatigue. As individuals and organizations bolster their cybersecurity measures, it is essential...
by Ymir Vigfusson | Mar 18, 2024 | Publication
The commonly known term social engineering refers to the act of manipulating people to gain access to confidential information or to influence their behavior. While traditional social engineering involves the attacker posing as someone else to deceive the target,...
by Ymir Vigfusson | Mar 8, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, organizations need to adopt a proactive approach to network security. One such approach that has gained popularity is the concept of Zero Trust. This article explores the use cases of Zero Trust and provides...
by Árni Thor Árnason | Mar 6, 2024 | Publication
MFA, or Multi-Factor Authentication, has become an integral part of our digital lives. It provides an added layer of security, requiring users to go through multiple steps to verify their identities. While MFA is undoubtedly beneficial, it is not without its...
by Ymir Vigfusson | Mar 4, 2024 | Publication
Protecting yourself from social engineering is more crucial than ever. Social engineering is a form of manipulation used by cyber attackers to exploit human psychology and gain unauthorized access to personal information or sensitive data. Understanding social...
by Árni Thor Árnason | Feb 29, 2024 | Publication
In today’s digital era, cloud technology has become an essential part of businesses. It allows organizations to store and access their data remotely, providing convenience and flexibility. However, with this convenience comes the risk of cloud data loss. Losing...