About Internal and external cyber threats

Who is the Enemy? Internal vs. External Cyber Threats

Data is every organization’s most critical asset. It is also a point of defense and a prized target for all kinds of electronic criminals. Typically, every organization faces two types of cyber threats; threats from within and threats from outsiders. This is why data breaches are reaching alarming levels, with 46 data records stolen per […]

How Syspeace Protects You From Ransomware Attacks Via RDP

Remote Desktop Protocol (RDP) are a fast-increasing attack vector to enterprise networks, due to the fact that corona made employees move their workstations from their offices to their home, which decreased the security normally implemented. Windows uses Remote Desktop Protocol (RPD) for remote connection to a server, as when employees are working from different locations, […]

Protecting Virtual Servers in the Evolving Cloud

Cloud adoption and the rapid growth of remote work environments have led many businesses to take advantage of virtualized servers. Virtual machines (VMs) offer businesses and developers a cost-effective way to consolidating their servers in a neat package. Businesses and developers can now deploy their applications or offer their products and services with immense flexibility […]

detection face

A public beta version of our RRAS Detector is here

After extensive internal development and testing, we now proudly present our public beta version of a Syspeace detector for Microsoft Routing and Remote Access Service. What is Routing and Remote Access Services?“RRAS”, as it is often known, is a component in Windows Server to provide a VPN so that internal servers can be accessed from […]

How to get the next generation to become professional cyber defenders

October has ended and so has the EU’s annual advocacy campaign “European Cybersecurity Month (ECSM)”. The campaign aims to raise awareness of cybersecurity threats. That includes promoting cybersecurity among citizens and providing up to date security information through education and good practices. Hundreds of cyber-related activities are organized throughout Europe every year during this month. Unfortunately, […]

Collaboration is Key in DevSecOps

DevSecOps – Where Collaboration is key

We hear many people talk about DevOps and SecOps. The DevOps wants to develop a strategy that bridges the gap between software development and IT operations. The team works with design, development, testing, implementation or deployment and maintenance. Security is normally introduced in the later stages. Somewhere between testing and deployment or even later.  But […]

Helping hand through the screen

Is the NIST Cybersecurity Framework for me?

As cybersecurity continues to increasingly be at the top of everyone’s mind, the knowledge about how brute force attacks directly is linked to business risk is growing. Mitigating these risks does not solve the complete problem but it lowers the exposure to an increasingly more professional cyber crime community. To get the best cybersecurity standard, […]

Bang for the buck – calculating the ROI of cybersecurity

  The cybercrime business – just like any other business – looks at their return on investment. If an attack does not not yield results, more than 60 percent of hackers will move on within 40 hours, since hackers have become corporate in their behavior, balancing costs, risks and effort. You are in competition with […]

Unprepared and exposed – welcome to the grim present of cybercrime

A study from Juniper Research foresees that an enormous amount will come from fines related to breaches of General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and any other data privacy laws. At the same time, a 70 percent increase in cybercrime is predicted until 2024. A lot of the advanced cyberattacks of […]

Dart - three arrows in red.

Cybercrime: How our demographics makes us the target

Reading this, you are probably in the riskiest region to be online, namely Northern Europe or North America.  Protection, such as legal and technical measurements on a country level has some effect – having a low score on Global Cybersecurity Index (GCI) corresponds with less vulnerability – but other factors, like high income, has more […]