Cybercrime: How our demographics makes us the target

Dart - three arrows in red.

Reading this, you are probably in the riskiest region to be online, namely Northern Europe or North America.  Protection, such as legal and technical measurements on a country level has some effect – having a low score on Global Cybersecurity Index (GCI) corresponds with less vulnerability – but other factors, like high income, has more […]

Read more

Optimize the Software Development Process using Leavitt’s Diamond

Optimize the Software Development Process using Leavitts’ Diamond

Producing top-quality software derive from excellent design. Excellent design depended on people who understand effective technology development as well as the field in which the application will be used.   In short, people, process, and technology are a necessary condition of success. The model, originating from the research of Harold Leavitt, focuses on how people […]

Read more

Creating change and business value with technology

How do you implement a new technology platform? By installing the software. Any IT-department can do it. How do you successfully implement a new technology platform? Well, that requires a bit more. One way is to consider Harold Leavitt’s Diamond Model and its three* perspectives for creating organizational change.  Process; as in the organization of people […]

Read more

Are your clients’ payments, medical records and data secure? [US]

Secure payments medical records and data with Syspeace.

Are you compliant, so that the credit card companies and banks continue to allow transactions? Are you ahead of security concerns, or do you struggle to keep up? Two weeks unable to take payments, what would that do to your business?  In this time of increasing level of cybercrimes, rules and regulations are a stepping […]

Read more

Brute Force Attacks are on the rise – do I need a SIRP? 

Brute Force Attacks are on the rise – do I need a SIRP? 

Technology means endless opportunities, but also endless headaches. Scripting, machine learning, AIs and easier access to more advanced systems does not mean your every-day becomes easier – it also means that the every-day of the malicious hacker becomes easier.  It is said that internet users have to keep track of about 190 passwords and PINs. […]

Read more

Securing business continuity – a necessity!

A man with an Anonymos mask holding a computer up to no ggod. A html-tag. Pink background.

What kind of disaster can your business take? How many unlucky incidents will you endure? How many malicious attacks are you from ceasing completely? Data is lost, we all know this. It might be a butter-fingered CEO making a dreadful mistake, a server giving up on life, a cloud provider going bankrupt or a fire […]

Read more

“Syspeace does exactly what it says it does”

Pink roses against a dark green background

Today, it’s a wonderful day. At IT-community Spiceworks, in a thread regarding Brute Force – OWA Exchange 2010, we found one of our customers in detail describing his view of Syspeace. And it makes our hearts sing. The praise in itself is heartwarming, but perhaps the idea he presents in the end is even more valuable. […]

Read more

A comprehensive approach to detecting RDP login failures

Light bulbs - several.

Syspeace’s way of detecting Windows logon failures is based on using the audit events produced by Windows. This is reliable and non-invasive, but in some cases, there are oddities. When a login succeeds or fails during Remote Desktop/Terminal Services authentication, the event is logged, but there is no reference to the IP address of the […]

Read more

Preventing brute force attacks against Outlook on the web

Falling green numbers on black screen

If you’re running Microsoft Exchange Server your also quite likely to have the Outlook on the web (previously: Exchange Web Connect, Outlook Web Access (OWA), Outlook Web App)  interface up and running to enable your users to use Exchange ActiveSync and access their email, calendars and contacts over an easy-to-use web interface accessible over the […]

Read more

How to battle slowgrind bruteforce attacks against Windows servers

A black sphere and falling letters. Dystopian and IT-ish.

The default rule of Syspeace is that if an intruder fails to login more than 5 times within 30 minutes, the intruders IP address is blocked, tracked and reported for 2 hours and simply is denied any access to the server.  A new trend though has emerged and that is for bruteforce attackers to “slowgrind” through […]

Read more

1 2 3
top