Below, I’ve summarized the most common issues we see during FortiGate audits for customers and in everyday operations. In practice, configuration errors with this popular firewall rarely stem from a lack of knowledge of network protocols, but more often from a misunderstanding of the FortiOS philosophy and the differences between local configuration and the one […]
Network segmentation is one of those solutions that everyone knows in theory, but in practice… things can be a bit different. In many companies, it still operates as “partially implemented” or “we’ll do it someday.” However, well-designed segmentation is the first line of defense against the effects of incidents, infrastructure chaos, and unplanned downtime. By […]
Wondering how to plan IT security when there are hundreds of solutions, and you’re just a one-person IT department or a small team? You look at your own company infrastructure and think, “Where do I begin?” The problem is that security architecture isn’t a single tool or a single recipe. Rather, it’s a map of […]
Modern public institutions rely on complex IT infrastructure to function. Hospitals, offices, and local government units all provide public services and store vast amounts of data. Therefore, implementing new IT infrastructure in the public sector must ensure the highest level of cybersecurity and business continuity. Meanwhile, cyberattacks on the public sector in Poland are becoming […]
Cyberthreats have long ceased to be a problem solely for the private sector. Hospitals, offices, and public institutions have all become targets of increasingly sophisticated attacks. From ransomware paralyzing hospitals to the encryption of documents in marshal’s offices, the consequences are not only costly but also threaten the daily functioning of citizens. NIS2 in the […]
A firewall is a key component of an IT security infrastructure. But even the best hardware and most advanced features won’t protect your network if they’re misconfigured. In reality, most threats stem not from a lack of a firewall, but from its incorrect use. In this article, we examine the most common firewall configuration errors, […]
Cisco Identity Services Engine (ISE) is a robust network access control (NAC) system that provides secure access to network resources. It integrates with an organization’s existing network infrastructure to enforce security policies, authenticate users and devices, and ensure compliance with security protocols. Cisco ISE operates by managing identities, ensuring that only authorized users and devices […]
The security of any organization depends on its weakest point. It’s not always a matter of internet connection or poor devices. There are many ways to get into an organization, including physically or using social engineering. It is important to check security, train employees and improve barriers regularly. A security audit report is the right […]
Online threats are developing at an equally dizzying pace as other technologies. Now, in the face of the unstable geopolitical situation – probably even faster. Legislative changes must keep pace with them, allowing for a minimum level of protection and, at least to a basic extent, ensuring strategic security, the well-being of recipients and the […]
According to the Niebezpiecznik.pl portal, ransomware gangs steal huge amounts of data monthly – over 10 terabytes. To better illustrate this – 10 TB is 10,000 hours of Full HD video (each hour is about 1GB) or 2,500 hours of 4K video. It’s imaginative, isn’t it? We know from the KPMG report “Cybersecurity Barometer 2022” […]