Cyberthreats have long ceased to be a problem solely for the private sector. Hospitals, offices, and public institutions have all become targets of increasingly sophisticated attacks. From ransomware paralyzing hospitals to the encryption of documents in marshal’s offices, the consequences are not only costly but also threaten the daily functioning of citizens. NIS2 in the […]
In an era of ever-increasing phishing attacks, increasingly sophisticated identity theft methods, and new regulations such as NIS2, the question is no longer whether MFA is worth investing in, but rather whether my organization can afford to continue to rely on outdated authentication methods? In this interview with Marcin Majchrzak, Sales Director for Yubico in […]
Have you ever forgotten your company email or VPN password? If so, you understand the frustration of trying to regain access. In a world where every system requires a different password – strong, long, and ideally unique – the average user becomes a credential juggler. The problem is that these juggles often end in… disaster. […]
A firewall is a key component of an IT security infrastructure. But even the best hardware and most advanced features won’t protect your network if they’re misconfigured. In reality, most threats stem not from a lack of a firewall, but from its incorrect use. In this article, we examine the most common firewall configuration errors, […]
What does an effective backup strategy consist of and how to choose the right solutions for your organization’s needs? Who will benefit the most from implementing professional backup tools and is there an “ideal” method of securing data? Dariusz Cudak, Pre-Sales Engineer at Xopero Software, one of the leading providers of data management and recovery […]
Cisco Identity Services Engine (ISE) is a robust network access control (NAC) system that provides secure access to network resources. It integrates with an organization’s existing network infrastructure to enforce security policies, authenticate users and devices, and ensure compliance with security protocols. Cisco ISE operates by managing identities, ensuring that only authorized users and devices […]
The security of any organization depends on its weakest point. It’s not always a matter of internet connection or poor devices. There are many ways to get into an organization, including physically or using social engineering. It is important to check security, train employees and improve barriers regularly. A security audit report is the right […]
Online threats are developing at an equally dizzying pace as other technologies. Now, in the face of the unstable geopolitical situation – probably even faster. Legislative changes must keep pace with them, allowing for a minimum level of protection and, at least to a basic extent, ensuring strategic security, the well-being of recipients and the […]
At the beginning of 2023, the EU NIS2 directive entered into force, introducing further changes in the field of cybersecurity. What do the new regulations mean for companies and which entities will have to meet additional cyber security requirements in connection with the update of the NIS regulations in force in Poland from 2018? We […]
Those who are familiar with Cisco ISE and have been using it for quite a few years have become accustomed to the licensing system known from ISE 1.x and 2.x. The well-known Base, Plus and Apex licenses end with the release of ISE 3.x. In their place, licenses of the so-called Tier Based, i.e. Essentials, […]