DIN EN ISO 27001:2022 defines numerous aspects of information security. One important aspect required in the new version is secure system configuration – also known as system hardening. Here’s what you need to know about it.
Linux hardening guide: How does it work for Ubuntu, Debian, Fedora & Co.
Nobody is perfect – especially no operating system! Therefore, system hardening for Linux is also recommended. However, the implementation can be complex in corporate environments. This is what you should consider.
Continue reading “Linux hardening guide: How does it work for Ubuntu, Debian, Fedora & Co.”
Less “Red Alert”: How the Security Operations Center Benefits Significantly from System Hardening
IT security specialists in so-called SOCs, CDCs or CSIRTs usually have a lot on their plate because they have to deal with numerous events and incidents. System hardening can significantly reduce the flood of (false) reports and at the same time improve the security of IT systems.
Windows 10/11 as spyware: How to stop data transmission to Microsoft
In the default configuration, the new Microsoft operating system reads some telemetry data without being asked and sends it to several servers for evaluation. There is an established measure to prevent this – and it has other positive “side effects”.
Continue reading “Windows 10/11 as spyware: How to stop data transmission to Microsoft”
Cyber insurance and system hardening: an important connection
Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional system hardening.
Continue reading “Cyber insurance and system hardening: an important connection”
Browser Hardening: How to fundamentally secure your browser with hardening
Don’t make it too easy for the “cyber gangsters”! Secure programs such as Chrome, Edge and Firefox properly with Browser Hardening. Here’s what you need to bear in mind.
Continue reading “Browser Hardening: How to fundamentally secure your browser with hardening”
This is why IT forensics and system hardening belong together
IT forensics and system hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and system hardening belong together”
Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?
Exploits like “DefenderSwitch” and “DefenderStop” can disable Windows Defender. Do they also succeed in doing so on a hardened system? We have tested it.
Continue reading “Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?”
How well does your IT service provider work? How to do a quick configuration check
Have you engaged a service provider? Does it really comply with regulatory requirements, for example in the area of IT security? Use this tool to check the quality of your service provider.
How much telemetry data do Windows 10 and Windows 11 really spy on?
A new tool from the German Federal Office for Information Security can be used to check how much telemetry information an unsecured Windows 10 or Windows 11 sends to Microsoft. We tried it out and came up with some astonishing results.
Continue reading “How much telemetry data do Windows 10 and Windows 11 really spy on?”