Skip to content

April 2023

How to detect and prevent the hacking tool Responder

Responder is a powerful network analysis and penetration testing tool that can be used to exploit weaknesses in a network. It is designed to intercept and analyze network traffic, particularly NetBIOS Name Service (NBT-NS) and Link-Local Multicast Name Resolution (LLMNR)… 

12 Steps To Stopping Hackers

To prevent an attacker and/or a red team from being successful in their mission of hacking, it is essential to implement robust security practices and continuously improve your organization’s security posture. Here are some key steps to protect your systems… 

network-security

Apache Hardening Guidelines

Introduction:We have prepared this hardening guideline to help safely and securely deploy and use the Apache web server. By following these recommendations, you can minimize the risk of cyber attacks and privacy breaches. Conclusion:By following these hardening guidelines, you can… 

iOS, iPhone & iPad Device Hardening Guideline

As organizations increasingly relies on iPhones and iPads for mobile communication and productivity, it is essential that Information Security establish proper security and privacy guidelines to safeguard company and personal data. This document serves as a hardening guideline for the… 

Android Device Hardening Guidelines

Introduction: This document provides guidelines on how to securely and safely use Android devices from a cyber security and privacy perspective. As a company that values the security and privacy of our employees and information, it is crucial to adhere… 

Active Directory Hardening Guideline

Introduction: Below is the top 25 technical controls that should be followed for securing Active Directory (AD). This aims to help provide the best practices for deploying and maintaining Windows Server Active Directory environments. Conclusion: By following these guidelines and… 

MacOS OSX Hardening Guideline for Secure and Private Usage

Introduction: As part of our ongoing commitment to maintaining a strong security posture and protecting the privacy of our employees, customers and company data, we have prepared this guideline to assist you in securely using and deploying MacOS OSX systems.… 

Windows 11 Hardening Guideline

Introduction: In order to maintain a strong cybersecurity posture and ensure the privacy of our organization’s data, we have developed a hardening guideline for using Windows 11. These guidelines must be used when deploying Windows 11. By following these guidelines,… 

Windows Server Hardening Guideline

Introduction: This document provides guidelines on how to safely and securely use Windows Server from a cybersecurity and privacy perspective. It aims to help provide the best practices for deploying and maintaining Windows Server environments. 1. General Security Recommendations 1.1.… 

Hardening Guideline for Safely and Securely Using RHEL Server

Introduction:This hardening guideline is designed to help company employees safely and securely deploy and use RHEL (Red Hat Enterprise Linux) Server from a cybersecurity and privacy perspective. Adhering to these guidelines will ensure that our organization remains resilient against cyber…