Who is protecting your business against hacker attacks?

Who is protecting your business against hacker attacks?

The illegal drug trade generates a profit of $400 billion annually. In comparison, cybercriminals make $600 billion each yearCybercrime is therefore more profitable than the global illegal drug trade, and by the time you have finished reading this post, a new hacker...
Protect your employees’ mobile devices

Protect your employees’ mobile devices

It is a misunderstanding to assume that sensitive data are not stored on mobile devices. The idea that data protection only matters for computers is a misconception. Although many employees do not directly store sensitive data on mobile devices, they often access apps...
Do you know what is going on in your IT infrastructure?

Do you know what is going on in your IT infrastructure?

In today’s digital world, cyberattacks often involve hackers compromising company data. By gaining access through an employee or user account, hackers can infiltrate the organization’s IT infrastructure. To prevent this scenario, UEBA (User Entity Behavior...
Avoid Drowning in Your Own Data Lake

Avoid Drowning in Your Own Data Lake

Massive amounts of data can pile up quickly. So, how do you prevent yourself from drowning in your own data lake? Collecting and storing large datasets isn’t free. To justify the expense, you need to use them effectively to achieve the business optimization goals that...
Can you Afford to Loose Data?

Can you Afford to Loose Data?

“Logging of data traffic means that we can document who has access to various data and when.” – Thomas Saabye Goltermann, Fredericia Municipality. Hacker attacks – it won’t happen to us We all understand the potential risk of being targeted by data...
SIEM – What is a SIEM Solution?

SIEM – What is a SIEM Solution?

SIEM stands for Security Information and Event Management. It is a combination of two earlier security monitoring techniques: SIM and SEM. The purpose of SIEM is to detect intruders who have managed to sneak past the network’s perimeter defenses. SIM stands for...