The not so isolated risk of legacy systems

Unfortunately, in today’s world, it is not just Vladimir Putin running Windows XP. Many continue to run the risk of keeping legacy systems within their production environment. I imagine for most; this has run through some sort of internal process…

Finding Access Anywhere Servers Using Certificates

Remote users are a part of every organization and the need to provide external access can be a real problem. For the bigger organizations, they will most likely implement several security controls in order to isolate their users from the rest of the internet. For some, they may want to go for the cheaper option to provide remote access......

How Company Branding Could Help Protect Your Microsoft Credentials.

Phishing isn't something new. In fact, today, it's one of the most common forms of cybercrime. Although we are all aware of it and even have services/software to help detect it, Phisherman still have great success. Even with all these…