IT forensics and System Hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and System Hardening belong together”
System Hardening & Secure Configuration
IT forensics and System Hardening are only seemingly two completely different areas of information security. In practice, many important overlaps become apparent.
Continue reading “This is why IT forensics and System Hardening belong together”
Exploits like “DefenderSwitch” and “DefenderStop” can disable Windows Defender. Do they also succeed in doing so on a hardened system? We have tested it.
Continue reading “Malware vs. system hardening: How risky is “DefenderSwitch” or “DefenderStop”?”
Have you engaged a service provider? Does it really comply with regulatory requirements, for example in the area of IT security? Use this tool to check the quality of your service provider.
A new tool from the German Federal Office for Information Security can be used to check how much telemetry information an unsecured Windows 10 or Windows 11 sends to Microsoft. We tried it out and came up with some astonishing results.
Continue reading “How much telemetry data do Windows 10 and Windows 11 really spy on?”
To ensure that company-relevant information is protected in the best possible way, those responsible must rely on System Hardening, among other things. We explain exactly what this is here.
Continue reading “What is System Hardening? What measures and solutions are possibe?”
Effective monitoring, System Hardening and more: Security Configuration Management makes it possible to create “secure environments”. These points should be considered and implemented.
Continue reading “Security Configuration Management: This is why it is so important for IT security”
From startups to medium-sized businesses to corporations: servers running Windows are found in all sizes of companies. This makes the operating system interesting for cyber-gangsters. System Hardening of Windows Server is therefore eminently important.
We explain the background here and give tips on Windows Server Hardening.
Continue reading “The Windows Server Hardening guide: what to do and how to do it”
If you deal with IT security or data protection – in short, information security – then you will stumble across DISA, CIS, ACSC and BSI quite quickly. We explain what the organizations and authorities behind these terms do and what they have to do with system hardening in particular.
In which year will the last updates and patches be released for Windows 11? Is there any information about End of Support Dates and End of Lifetime? Important questions, which we clarify here.
Continue reading “When does support for Windows 11 end? What should be considered until then?”
How does System Hardening work with Windows 11? Are there any special recommendations for System Hardening? We give you an overview of how to harden the new Windows operating system.
Continue reading “Windows 11 System Hardening: Essential measures und tips”