9-1-1 or 1-1-2 is used globally when calling for help. But which number is used for requesting cyber-help?
Hackers can easily exploit known vulnerabilities
Hackers can easily exploit known vulnerabilities, says Artur Ganc, Principal Consultant in NNIT A/S. Get his 10 steps to successful patch management framework here: http://bit.ly/2evEu2f
Keep your sensitive data secure
Data Access Governance requires careful consideration, be balanced to business needs, and needs to be based on how important it is to keep your sensitive data secure. Happy to announce yet another Security Insight blog post. Today published by Johan Holkmann Jacobsen, Identity & Access Management Senior Consultant in NNIT A7S. Read more here.
Yes, we need protection, all of us!
Yes, we need protection, all of us! Good read from John Clayton, Cyber Security Specialist, in NNIT A/S. Read the full article here.
A break in into the ICS/SCADA system can disturb, corrupt or even destroy your production
Do you remember the latest stories in the news where cyber-criminals caused hundreds of domestic and international flights to be grounded at multiple airports across Sweden due to its air traffic control system being disabled, and where a nuclear power plant in Germany was infected with computer viruses via USB sticks?