Sweden HQ
Syspeace AB
Hästholmsvägen 28
SE-131 30 Nacka
Sweden
Email: support@syspeace.com
New York, USA
295 Madison Avenue, 12th Floor
New York, NY, 10017
USA
Phone: 1-646-569-9114
Ottawa, Canada
Constitution Square
340 Albert Street, 13th Floor
Ottawa, Ontario
Canada
K1R 7Y6
Phone: 1-613-686-3060
Is the NIST Cybersecurity Framework for me?
/in BlogAs cybersecurity continues to increasingly be at the top of everyone’s mind, the knowledge about how brute force attacks directly is linked to business risk is growing. Mitigating these risks does not solve the complete problem but it lowers the exposure to an increasingly more professional cyber crime community. To get the best cybersecurity standard, […]
The first-ever reported human death indirectly caused by a ransomware attack
/in NewsIn September the first death was reported as the first-ever human death indirectly caused by a ransomware attack. The Dusseldorf hospital in Germany was unable to receive the patient as it was in the midst of dealing with a ransomware attack that hit its network and infected more than 30 internal servers. The hospital couldn’t […]
Bang for the buck – calculating the ROI of cybersecurity
/in BlogThe cybercrime business – just like any other business – looks at their return on investment. If an attack does not not yield results, more than 60 percent of hackers will move on within 40 hours, since hackers have become corporate in their behavior, balancing costs, risks and effort. You are in competition with […]
Unprepared and exposed – welcome to the grim present of cybercrime
/in BlogA study from Juniper Research foresees that an enormous amount will come from fines related to breaches of General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and any other data privacy laws. At the same time, a 70 percent increase in cybercrime is predicted until 2024. A lot of the advanced cyberattacks of […]
Cybercrime: How our demographics makes us the target
/in BlogReading this, you are probably in the riskiest region to be online, namely Northern Europe or North America. Protection, such as legal and technical measurements on a country level has some effect – having a low score on Global Cybersecurity Index (GCI) corresponds with less vulnerability – but other factors, like high income, has more […]
Optimize the Software Development Process using Leavitt’s Diamond
/in BlogProducing top-quality software derive from excellent design. Excellent design depended on people who understand effective technology development as well as the field in which the application will be used. In short, people, process, and technology are a necessary condition of success. The model, originating from the research of Harold Leavitt, focuses on how people […]
Creating change and business value with technology
/in BlogHow do you implement a new technology platform? By installing the software. Any IT-department can do it. How do you successfully implement a new technology platform? Well, that requires a bit more. One way is to consider Harold Leavitt’s Diamond Model and its three* perspectives for creating organizational change. Process; as in the organization of people […]
Are your clients’ payments, medical records and data secure? [US]
/in BlogAre you compliant, so that the credit card companies and banks continue to allow transactions? Are you ahead of security concerns, or do you struggle to keep up? Two weeks unable to take payments, what would that do to your business? In this time of increasing level of cybercrimes, rules and regulations are a stepping […]
Brute Force Attacks are on the rise – do I need a SIRP?
/in BlogTechnology means endless opportunities, but also endless headaches. Scripting, machine learning, AIs and easier access to more advanced systems does not mean your every-day becomes easier – it also means that the every-day of the malicious hacker becomes easier. It is said that internet users have to keep track of about 190 passwords and PINs. […]
Securing business continuity – a necessity!
/in BlogWhat kind of disaster can your business take? How many unlucky incidents will you endure? How many malicious attacks are you from ceasing completely? Data is lost, we all know this. It might be a butter-fingered CEO making a dreadful mistake, a server giving up on life, a cloud provider going bankrupt or a fire […]