Insurers are raising the prices of their cyber insurance policies. This can be changed, for example, with professional system hardening.
Don’t make it too easy for the “cyber gangsters”! Secure programs such as Chrome, Edge and Firefox properly with Browser Hardening. Here’s what you need to bear in mind.
IT forensics and system hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Don’t become an easy victim of cyber attacks! Read here why “cyber security” and the hardening of IT systems must be at the top of the list of priorities in 2023.
Exploits like “DefenderSwitch” and “DefenderStop” can disable Windows Defender. Do they also succeed in doing so on a hardened system? We have tested it.
Have you engaged a service provider? Does it really comply with regulatory requirements, for example in the area of IT security? Use this tool to check the quality of your service provider.
A new tool from the German Federal Office for Information Security can be used to check how much telemetry information an unsecured Windows 10 or Windows 11 sends to Microsoft. We tried it out and came up with some astonishing results.
Does system hardening really solve many security vulnerabilities? And is 100% system hardening possible? We provide a few insights and examples in this article.
To ensure that company-relevant information is protected in the best possible way, those responsible must rely on System Hardening, among other things. We explain exactly what this is here.
We are often asked why we do not perform system hardening based on group policies or group policy objects. The quick answer: Because the handling is inefficient and the results are unsatisfactory! We explain why in this article.