Blog | Cryptzone Insight

Password security – friend or foe?

Posted on Jul 16, 2014

Authentication techniques, combined with authorization rules, often represent the first and last lines of defense in IT security. The two concepts are the twin pillars of access control, around which all other principles are centered. Most of the time, authentication comes down to the tried and tested combo of a username and password. The password [...]

Read More

Lack of compliance audits puts confidential SharePoint content at risk

Posted on Jul 11, 2014

Microsoft SharePoint was designed to provide tools for efficient collaboration and content management, and in those areas it excels – the platform is now ubiquitous in workplaces around the world. Healthcare providers, government bodies and the financial services sector all have SharePoint implemented, with some farms supporting thousands of users and millions of documents. Unfortunately, [...]

Read More

Stopping Snowden: what could the NSA have done differently?

Posted on Jun 27, 2014

Edward Snowden's National Security Agency (NSA) leaks last year are causing organizations to rethink the way they are storing sensitive data.  In fact, Edward Snowden's release of NSA information has been so far-reaching that it's easy to ignore the underlining facts.   To begin with, Snowden wasn't an elite hacker with significant years of experience [...]

Read More

Calculating the cost of a data breach

Posted on Jun 25, 2014

Data breaches come in many forms. Some are the result of opportunistic employees with wide-open access to a business network, while others are coordinated by cybercriminals on the other side of the world via malware and phishing attacks. Some involve the theft of intellectual property by a company's competitors, while others result in masses of [...]

Read More

Cryptzone Open House – Evidence that security still at top of business agenda

Posted on Jun 9, 2014

Cryptzone welcomed nearly 80 guests to its Gothenburg office on Wednesday 4 June. The Open House event was hosted by CTO, Håkan Saxmo and was primarily to discover and recruit the brightest and most talented developers and cybersecurity professionals in the region. And the calibre of applicant didn’t disappoint. It was attended by The Deputy [...]

Read More