BlogHide Resteemslarshilse (25)in cybercrime • 5 years agoPublications on Cybersecurity by Lars HilseThreat Assessment: BitcoinDanger to the United States' National Security and her Economic and Commercial Interests ISBN 978-1-489-52959-6 SHUT UP! And get a profitable Social Media Policy $14.3…larshilse (25)in cybersecurity • 5 years agoSpeeches and Panels on Cybersecurity by Lars HilseKeynote: Non-Geo Warfare (Space and Cyber): National Security Implications The International Defence Exhibition and Seminar (IDEAS) | Karachi, Pakistan (2018) Expert at the Hearing: The Security…larshilse (25)in acrac • 5 years agoYour cloud software solution should have an offline version for business continuity purposesThat an increasing amount of corporations were pressing users, and corporations to move to what is now known as the cloud. Back then the associated services were referred to as software as a…larshilse (25)in digitalethics • 5 years agoLessons learned from the internet: from creation to finish, what what not to implement into autonomous driving and the smart gridThe first thing that comes to my mind when I think of the internet and its advancement is that we should have done a much better job in securing it against… well pretty much anything going amok…larshilse (25)in acrac • 5 years agoWhy a detailed network documentation is essential?More often than not when I walk into a building I will see RJ-45 network outlets in the wild. Without having done exact calculations I was able to hook up my laptop to this outlet, and have full…larshilse (25)in acrac • 5 years agoPrinters should be segregated from the rest of the networkWhen it comes to security risks for networks, hardly anyone will think of a printer as an existential threat to an organization. However, multiple cases proving that printers, and other IOT devices…larshilse (25)in ipaddress • 5 years agoWhy it’s a bad idea to have your device’s IP address publicly visible!You know how you walk into an office building, and the machines standing around have stickers on them with their IP address clearly visible to the general public? Well, thank you for that! You just…larshilse (25)in cloudcomputing • 5 years agoDo encrypted cloud backups have benefits I’m missing?n fact, they do! Unless you are set in a very dynamic environment, where a lot of changes to files in operational Infrastructure happens You have probably follow the trend, and have a cloud-based…larshilse (25)in cloudstorage • 5 years agoThe data you store in the cloud must be segregated from that of other clientsOne of the most problematic issues that is going to strike us in the near future is the cross infection of systems. Currently there are no sane arguments to support insisting on a totally isolated…larshilse (25)in acrac • 5 years agoWhy you should isolate un-patchable, end-of-life softwareAnd another blog post from the recent past I outlined why a patch policy and an update policy maybe critical for survival of an organization. On rare occasions, and actually more often than…larshilse (25)in accesslimitation • 5 years agoPhysical access to data is restricted?Justifiably you have the questions poking around in your head about why you should limit physical access to data? The answer is quite simple::: first of all let’s start with a definition of what I…larshilse (25)in intelligence • 5 years agoPolice Proof local storage/raid proofIf you years ago I was contacted by an internationally operating law firm. They had very special requirements as to their data protection. I never did ask about the emphasis they had towards their…larshilse (25)in digitalethics • 5 years agoEU media’s misinterpretation on espionage and human rights violations in the digital realmWhen nation states spy on other nation states that’s called espionage. When nation states spy on the populace of an entire nation; that is a human rights violation! So when the Snowden revelations…larshilse (25)in acrac • 5 years agoWhat Active Directory backup do you pursue?So one of the most hardest things to back up regularly is going to be here active directory. Due to the complex and constantly changing environment this otherwise great piece of software is set in…larshilse (25)in cctv • 5 years agoYour servers and critical infrastructure elements should be in an unmarked, locked room with access control and access log as well as CCTVIt regularly makes you wonder how many organizations have their servers and other critical infrastructure in rooms marked clearly as the server and communication room. When confronted with a…larshilse (25)in acrac • 6 years agoWhy you need a patch and update policy, and protocolBut it appears that one of the main reasons for malware, rent somewhere, and other dubious software is able to spread so quick within organizations is due to the fact that systems call police…larshilse (25)in cybercrime • 6 years agoProtecting your organisation from the risk of social engineeringSocial engineering describes the process by which an attacker gains access to a facility or system by manipulating someone to grant them access they shouldn’t have in the first place. When…larshilse (25)in ceofraud • 6 years agoProtecting your organisation from CEO fraudOne of the most costly cyber threats/risks is CEO fraud. The attackers impersonate a senior representative of the company by email mostly. With a shady excuse they will get in touch with a…