larshilse (25)in #cybercrime • 5 years agoPublications on Cybersecurity by Lars HilseThreat Assessment: BitcoinDanger to the United States' National Security and her Economic and Commercial Interests…larshilse (25)in #cybersecurity • 5 years agoSpeeches and Panels on Cybersecurity by Lars HilseKeynote: Non-Geo Warfare (Space and Cyber): National Security Implications The International Defence Exhibition and…larshilse (25)in #acrac • 5 years agoYour cloud software solution should have an offline version for business continuity purposesThat an increasing amount of corporations were pressing users, and corporations to move to what is now known as the…larshilse (25)in #digitalethics • 5 years agoLessons learned from the internet: from creation to finish, what what not to implement into autonomous driving and the smart gridThe first thing that comes to my mind when I think of the internet and its advancement is that we should have done a…larshilse (25)in #acrac • 5 years agoWhy a detailed network documentation is essential?More often than not when I walk into a building I will see RJ-45 network outlets in the wild. Without having done…larshilse (25)in #acrac • 5 years agoPrinters should be segregated from the rest of the networkWhen it comes to security risks for networks, hardly anyone will think of a printer as an existential threat to an…larshilse (25)in #ipaddress • 5 years agoWhy it’s a bad idea to have your device’s IP address publicly visible!You know how you walk into an office building, and the machines standing around have stickers on them with their IP…larshilse (25)in #cloudcomputing • 5 years agoDo encrypted cloud backups have benefits I’m missing?n fact, they do! Unless you are set in a very dynamic environment, where a lot of changes to files in operational…larshilse (25)in #cloudstorage • 5 years agoThe data you store in the cloud must be segregated from that of other clientsOne of the most problematic issues that is going to strike us in the near future is the cross infection of systems.…larshilse (25)in #acrac • 5 years agoWhy you should isolate un-patchable, end-of-life softwareAnd another blog post from the recent past I outlined why a patch policy and an update policy maybe critical for…larshilse (25)in #accesslimitation • 5 years agoPhysical access to data is restricted?Justifiably you have the questions poking around in your head about why you should limit physical access to data? The…larshilse (25)in #intelligence • 5 years agoPolice Proof local storage/raid proofIf you years ago I was contacted by an internationally operating law firm. They had very special requirements as to…larshilse (25)in #digitalethics • 5 years agoEU media’s misinterpretation on espionage and human rights violations in the digital realmWhen nation states spy on other nation states that’s called espionage. When nation states spy on the populace of an…larshilse (25)in #acrac • 5 years agoWhat Active Directory backup do you pursue?So one of the most hardest things to back up regularly is going to be here active directory. Due to the complex and…larshilse (25)in #cctv • 5 years agoYour servers and critical infrastructure elements should be in an unmarked, locked room with access control and access log as well as CCTVIt regularly makes you wonder how many organizations have their servers and other critical infrastructure in rooms…larshilse (25)in #acrac • 6 years agoWhy you need a patch and update policy, and protocolBut it appears that one of the main reasons for malware, rent somewhere, and other dubious software is able to spread…larshilse (25)in #cybercrime • 6 years agoProtecting your organisation from the risk of social engineeringSocial engineering describes the process by which an attacker gains access to a facility or system by manipulating…larshilse (25)in #ceofraud • 6 years agoProtecting your organisation from CEO fraudOne of the most costly cyber threats/risks is CEO fraud. The attackers impersonate a senior representative of the…