Optimize the Software Development Process using Leavitts’ Diamond

Optimize the Software Development Process using Leavitt’s Diamond

Producing top-quality software derive from excellent design. Excellent design depended on people who understand effective technology development as well as the field in which the application will be used.   In short, people, process, and technology are a necessary condition of success. The model, originating from the research of Harold Leavitt, focuses on how people […]

Creating change and business value with technology

How do you implement a new technology platform? By installing the software. Any IT-department can do it. How do you successfully implement a new technology platform? Well, that requires a bit more. One way is to consider Harold Leavitt’s Diamond Model and its three* perspectives for creating organizational change.  Process; as in the organization of people […]

Secure payments medical records and data with Syspeace.

Are your clients’ payments, medical records and data secure? [US]

Are you compliant, so that the credit card companies and banks continue to allow transactions? Are you ahead of security concerns, or do you struggle to keep up? Two weeks unable to take payments, what would that do to your business?  In this time of increasing level of cybercrimes, rules and regulations are a stepping […]

Brute Force Attacks are on the rise – do I need a SIRP? 

Brute Force Attacks are on the rise – do I need a SIRP? 

Technology means endless opportunities, but also endless headaches. Scripting, machine learning, AIs and easier access to more advanced systems does not mean your every-day becomes easier – it also means that the every-day of the malicious hacker becomes easier.  It is said that internet users have to keep track of about 190 passwords and PINs. […]

A man with an Anonymos mask holding a computer up to no ggod. A html-tag. Pink background.

Securing business continuity – a necessity!

What kind of disaster can your business take? How many unlucky incidents will you endure? How many malicious attacks are you from ceasing completely? Data is lost, we all know this. It might be a butter-fingered CEO making a dreadful mistake, a server giving up on life, a cloud provider going bankrupt or a fire […]

Pink roses against a dark green background

“Syspeace does exactly what it says it does”

Today, it’s a wonderful day. At IT-community Spiceworks, in a thread regarding Brute Force – OWA Exchange 2010, we found one of our customers in detail describing his view of Syspeace. And it makes our hearts sing. The praise in itself is heartwarming, but perhaps the idea he presents in the end is even more valuable. […]

Light bulbs - several.

A comprehensive approach to detecting RDP login failures

Syspeace’s way of detecting Windows logon failures is based on using the audit events produced by Windows. This is reliable and non-invasive, but in some cases, there are oddities. When a login succeeds or fails during Remote Desktop/Terminal Services authentication, the event is logged, but there is no reference to the IP address of the […]

Falling green numbers on black screen

Preventing brute force attacks against Outlook on the web

If you’re running Microsoft Exchange Server your also quite likely to have the Outlook on the web (previously: Exchange Web Connect, Outlook Web Access (OWA), Outlook Web App)  interface up and running to enable your users to use Exchange ActiveSync and access their email, calendars and contacts over an easy-to-use web interface accessible over the […]

box-with-product

How to block an ongoing brute force attack

If your server or data center is targeted by a brute force attack it might be hard to figure out how to quickly make stop it. If the attack is from a single IP address you’d probably block it in your external firewall or the Windows Server firewall. And after that start tracking and reporting the […]

A black sphere and falling letters. Dystopian and IT-ish.

How to battle slowgrind bruteforce attacks against Windows servers

The default rule of Syspeace is that if an intruder fails to login more than 5 times within 30 minutes, the intruders IP address is blocked, tracked and reported for 2 hours and simply is denied any access to the server.  A new trend though has emerged and that is for bruteforce attackers to “slowgrind” through […]