Keep your sensitive data secure
Data Access Governance requires careful consideration, be balanced to business needs, and needs to be based on how important it is to keep your sensitive data secure. Happy to announce yet another Security Insight blog post. Today published by Johan Holkmann Jacobsen, Identity & Access Management Senior Consultant in NNIT A7S. Read more here.
Be aware of the RATs
Be aware of the RAT's - a deep dive into the area of Remote Administration Tools (RATs) by John Clayton, IT Management Consultant and Cyber Security Specialist in NNIT: http://bit.ly/2caislG
Control Your Security & Privacy in the Cloud
Many companies worry about security and privacy when migrating to cloud services. Read more here: http://bit.ly/2aNYxtT
Yes, we need protection, all of us!
Yes, we need protection, all of us! Good read from John Clayton, Cyber Security Specialist, in NNIT A/S. Read the full article here.
A break in into the ICS/SCADA system can disturb, corrupt or even destroy your production
Do you remember the latest stories in the news where cyber-criminals caused hundreds of domestic and international flights to be grounded at multiple airports across Sweden due to its air traffic control system being disabled, and where a nuclear power plant in Germany was infected with computer viruses via USB sticks?
Hacked power stations, crashed airplanes, or dark streets - a direct result of compromised process control systems
Hacked power stations, crashed airplanes, or dark streets would be a direct result of compromised process control systems. If you were in charge of security, how would you deal with this?