Logo Logo Logo Logo Logo
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch
  • Solutions
    • Network Vulnerability Scanner
    • Web Application Security
    • Network Security Audits
    • Hacker Alert
  • Technique
  • Sectors
  • Blog
  • Contact
    • Find a Guardian360 partner
    • About us
      • Guardian360
      • Premium partner The Hague Security Delta
      • ISO27001 certified
      • Cybersecurity Germany
    • Working at Guardian360
      • Vacancy Site Reliability Engineer (SRE) (full-time, onsite or remote)
      • Vacancy Software Engineer (SWE) (full-time, onsite or remote)
  • Become a Partner
  • Dutch

05 Sep Cybersecurity, Ransomware: You Deserve What You Tolerate…

Posted at 08:43h in Blog by Jan Martijn Broekhof 0 Comments
7 Likes
Share

Many hacks, breaches and failures occur because of a series of bad decisions, poor strategy & a lack of enforcement of well-known security practices. by Forrester Research • Aug 21, 2017 After reading through some other blogs and strategy papers, (Don’t judge me. To some of us,...

Read More

05 Sep Catching the hackers in the act

Posted at 07:35h in Blog by Jan Martijn Broekhof 0 Comments
8 Likes
Share

Cyber-criminals start attacking servers newly set up online about an hour after they are switched on, suggests research. The servers were part of an experiment the BBC asked a security company to carry out to judge the scale and calibre of cyber-attacks that firms face every...

Read More

29 Aug Cybersecurity Preparedness: 4 Opportunities for MSPs to Take Charge

Posted at 08:55h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

Nearly 90 percent of organizations have faith that the security techniques and technologies they have in place provide the protection they need. And almost 60 percent believe they are less vulnerable from a security threat than they were as recently as one year ago. These...

Read More

22 Aug Can the security community grow up?

Posted at 08:23h in Blog by Jan Martijn Broekhof 0 Comments
5 Likes
Share

As the times change, the security community needs to adapt. We live in an imperfect world, as Alex Stamos, Chief Information Security Officer of Facebook pointed out in his recent BlackHat 2017 keynote address. Instead of trying to punish each other, hackers and innovators need to work...

Read More

24 Jul Why nation-states spy on private Industry and how do we defend ourselves?

Posted at 09:45h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

There are a range of reasons why states engage in cyber-espionage targeting the private sector, but Alex Vaystikh explains that their methods are mostly the same as ordinary cyber-criminals, and defence is possible. As the recent Verizon Breach Report showed, cyber-espionage has risen significantly in the...

Read More

04 Jul Non-admin accounts mitigate 94% of critical Windows vulnerabilities

Posted at 20:18h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

A new report suggests that Windows admins and users could mitigate 94% of all critical vulnerabilities automatically by running non-admin accounts. It is common sense that using standard user accounts on Windows, opposed to accounts with elevated privileges, is a good security practice. The main reason behind...

Read More

27 Jun Ransomware and the Internet of Things

Posted at 15:39h in Blog by Jan Martijn Broekhof 0 Comments
5 Likes
Share

As devastating as the latest widespread ransomware attacks have been, it's a problem with a solution. If your copy of Windows is relatively current and you've kept it updated, your laptop is immune. It's only older unpatched systems on your computer that are vulnerable. Patching is...

Read More

23 Jun 76% of Ransomware Attacks Strike Via Email

Posted at 06:33h in Blog by Jan Martijn Broekhof 0 Comments
3 Likes
Share

Email remains the No. 1 threat vector for businesses, with a full 76% of ransomware attacks starting with a malicious message. According to a survey from Barracuda, phishing—and particularly spear phishing—has become a lucrative art. The attackers also do not discriminate based on company size. Email...

Read More

20 Jun Ransomware isn’t new, but it’s increasingly popular and profitable.

Posted at 15:37h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It's extortion taken to its networked extreme. The criminals provide step-by-step instructions on how to pay, sometimes even offering a help line for victims unsure...

Read More

15 Jun The Behavioral Economics of Why Executives Underinvest in Cybersecurity

Posted at 11:19h in Blog by Jan Martijn Broekhof 0 Comments
4 Likes
Share

Determining the ROI for any cybersecurity investment, from staff training to AI-enabled authentication managers, can best be described as an enigma shrouded in mystery. The digital threat landscape changes constantly, and it’s very difficult to know the probability of any given attack succeeding — or...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9


Visiting address
Orteliuslaan 1000
3528 BD  Utrecht

Schouwburgplein 30-34
3012 CL Rotterdam
The Netherlands

Mailing address
P.O. box 2655
NL3000 CR Rotterdam
The Netherlands

Tel. +31 88 225 15 00

Find a Guardian360 partner

Guardian360 offers you services through selected partners.

Would you like contact with a partner? Find a partner.

Downloads, White papers and Demo

› Request a pilot

› Scan your website

› Download Guardian360 App

› Download whitepaper

Search

© Copyright Guardian360 | General Terms and Conditions | Privacy and cookiepolicy | Coordinated Vulnerability Disclosure