Medium-sized and large companies are the focus of cyber criminals. What can help? Basic preventive system protection. We have the right solution.
Continue reading “How can SMEs make their IT systems more resilient?”
System Hardening & Secure Configuration
Medium-sized and large companies are the focus of cyber criminals. What can help? Basic preventive system protection. We have the right solution.
Continue reading “How can SMEs make their IT systems more resilient?”
If you want to harden one or more Linux systems, you need to bring a lot of time, energy and patience with you – because there are all kinds of hurdles to overcome. These are the biggest and most annoying “showstoppers”.
Continue reading “SUSE, Ubuntu, Debian, Red Hat & Co: Why Linux System Hardening is so complicated”
Do you really need to harden a Linux system? What is important to bear in mind during implementation? And what challenges do you have to overcome so that hardening can really be realised sustainably? Here are the answers.
Continue reading “Linux System Hardening: Background, Measures and Tool Tips”
Nobody is perfect – not even Linux. You may still have an undiscovered security vulnerability on your system that allows attackers to penetrate the network via your printers. Here’s how you can avoid a CUPS disaster.
SMBv1 is insecure – this has been known since 2014. Despite this, the Eternal Blue Exploit is still hitting some company networks. We show you how you can prevent attackers from using this ‘popular’ vulnerability as a gateway.
If you work in the financial sector, you need to know about DORA. Here you can find out what the new EU regulation means for your company or organisation and what important role system hardening plays in this.
Continue reading “DORA: What does the EU regulation have to do with System Hardening? [Update]”
There are more and more requirements for companies and organizations that need secure configuration or system hardening. Find out what they are here.
Does System Hardening really achieve anything? Do the IT security measures really close many security gaps? How can you measure the results? And is a 100% hardening even possible? We provide you with some deep insights and verifiable facts here.
Continue reading “System Hardening on the test bench: examples, tests and real-life results”
What is ‘Secure Configuration’, why is it so important and how can it be implemented? Find out everything you need to know about the secure configuration of systems here.
Continue reading “Secure Configuration – FAQ: The 13 most important questions & answers”
NIS 2 is here. The requirements of the EU-wide cybersecurity directive are very high. Here you can find out what you need to pay attention to when implementing the directive.