IT forensics and system hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and system hardening belong together”
System Hardening & Data Protection
IT forensics and system hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and system hardening belong together”
Don’t become an easy victim of cyber attacks! Read here why “cyber security” and the hardening of IT systems must be at the top of the list of priorities in 2023.
Continue reading “Why system hardening is a “must have” for your company in 2023″
DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
Exploits like “DefenderSwitch” and “DefenderStop” can disable Windows Defender. Do they also succeed in doing so on a hardened system? We have tested it.
Continue reading “Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?”
Have you engaged a service provider? Does it really comply with regulatory requirements, for example in the area of IT security? Use this tool to check the quality of your service provider.
A new tool from the German Federal Office for Information Security can be used to check how much telemetry information an unsecured Windows 10 or Windows 11 sends to Microsoft. We tried it out and came up with some astonishing results.
Continue reading “How much telemetry data do Windows 10 and Windows 11 really spy on?”
Does system hardening really solve many security vulnerabilities? And is 100% system hardening possible? We provide a few insights and examples in this article.
Continue reading “Theory vs. practice: What is the real benefit of system hardening in the field?”
To ensure that company-relevant information is protected in the best possible way, those responsible must rely on system hardening, among other things. Here we explain exactly what that is.
Continue reading “What is system hardening? What measures are in place?”
We are often asked why we do not perform system hardening based on group policies or group policy objects. The quick answer: Because the handling is inefficient and the results are unsatisfactory! We explain why in this article.
Continue reading “Group Policy vs. System Hardening: Why GPOs don’t provide sustainable security”
From startups to medium-sized businesses to corporations: servers running Windows are found in all sizes of companies. This makes the operating system interesting for cyber-gangsters. System hardening of Windows Server is therefore eminently important.
We explain the background here and give tips on Windows server hardening.
Continue reading “Windows Server system hardening: Essential measures and tips”