The Combitech blog
Our experts blog about trends and insights from Cyber Security and digitalization. They share their experience from the forefront of technology.
Our experts blog about trends and insights from Cyber Security and digitalization. They share their experience from the forefront of technology.
28 November, 2019
Do you have a step counter on your mobile? Do you use an app for setting goals and following up your training? Do you look at how an article or a service is ranked before you click Buy? Have you and your manager set up measurable objectives for your work this year… objectives that might affect your salary or bonus? Many of us are nearly obsessed by measuring, ranking and evaluating – both in our private and professional lives. Cecilia Unell, business developer and enterprise architect at Combitech, reflect on the art of measurement.
28 November, 2019
Johan Thulin, senior consultant in Cyber Security at Combitech, reflects on how security can become a natural part of projects. As well as how an organization can develop a product or system where security doesn’t get in the way. Can Design Thinking contribute to a solution?
25 June, 2018
A while ago, we arranged Hackaway day – a day when we tried to hack things to learn more. This day, we focused on smart speakers. But, what does it really mean to hack something? The answer to that depends on who you ask.
25 June, 2018
For the eleventh consecutive year, the largest cyber security conference in the Nordics, Paranoia, was recently arranged in Oslo. The conference was an opportunity to listen in to some of the leading experts in the industry, such as Bruce Schneier and ethical hacker FC. As usual, Paranoia was also a meeting place to discuss current cyber security issues. From this year’s conference there are above all three things I take with me:
28 October, 2017
When it comes to creating a solid security culture and working effectively with cyber security, knowledge is key. Successful cyber security and focusing on the right things requires a comprehensive understanding of how a cyber attack can happen.
6 September, 2017
The film above presents the collaboration between Combitech, Securitas, and Microsoft. The collaboration aimed to effectively study how a digitalised solution – in this case with the help of Microsoft's HoloLens – could be applied to assist a security guard in their workday.
4 July, 2017
Not again! Isn't that the feeling, when the effects of the WannaCry incident are still fresh in the memory and yet the next attack is already rearing its ugly head? As usual, the attack relies on computers which have not installed up-to-date security patches, leading to the initial reaction "How hard can it be to update your system?!" However, it's not actually always so simple.
20 June, 2017
I probably shouldn't have been surprised when a friend asked me if we dare becoming sick in the future.
16 June, 2017
Are self-driving cars secure? What happens if terrorists manage to hack one?
22 May, 2017
There is today a palpable shortage in competence and resources within IT and information security. A survey commissioned by the Swedish IT and Telecom Industries trade organisation shows that there now exists a deficit of 30,000 IT experts in Sweden, and that this figure continues to grow. One major reason for the growing demand for IT and cyber security personnel is the increasing number of cyber attacks, connected devices and the vulnerabilities brought to light by digitalisation in general. We face then a significant challenge in the future, as we need more people with the right IT security competence than are currently available.
22 May, 2017
We live in really interesting times, with a pace of development that is completely unprecedented. All in all, this is marvellous, but it also means that an ever-growing number of people need to learn new technologies and work procedures. And this a positive thing, provided there's enough time for it. Which isn't always the case.
13 April, 2017
Nowadays, you are able to use electronic identification (eID), like BankID or Mobilt BankID in Sweden, for numerous services, such as logging into government websites, signing contracts and authorising financial transactions. But along with these digital advantages – as is so often the case – come untold risks.
7 March, 2017
Digitalization means the world we are familiar with is changing. In just a few years, several major companies that are currently on the crest of a wave will have lost their top positions. Experts say seven of ten professions that our children will be pursuing do not yet exist. Meanwhile, it has been predicted that some 25 percent of companies’ digital traffic will be outside their Control.
1 March, 2017
It can hardly have escaped anyone’s notice that the new General Data Protection Regulation, or GDPR, will enter into force next year. But with just 450 days to go, companies’ knowledge of GDPR is still shockingly poor.
14 February, 2017
Digitalization permeates every aspect of society and generates a wealth of opportunities for both companies and individuals. We are increasingly relying on digital functions and linking up more smart devices with the internet, such as house alarms, baby monitors and activity trackers.
20 December, 2016
2016 has seen increased digitalization fuelling the DevOps shift in earnest, but at the same time the challenges are becoming increasingly clear, particularly for those of us who are security experts. How do we make sure we don’t get left behind in the rapid pace of developments?
6 December, 2016
The way we work today is completely different from the way things were 20 years ago. Nowadays we expect to be able to read emails on our phones, participate in global video conferences while on our summer hols and order goods online. In a short space of time we’ve managed to streamline our way of working. The problem is that many companies are still using the same internal training methods that were popular back when we were listening to music on cassettes.
30 November, 2016
In my last post, about cyber threats, I talked about a number of security risks that it’s important to protect yourself against. As a follow-up, here are my five top intrusion prevention tips to protect your company/organization. The points can also help you decide what’s important for your private data.
22 November, 2016
The standard hacker profile of a thrill-seeker who is drawn by the challenge of trying to get into closed systems no longer fits with reality. There’s a huge amount to gain these days from cyber criminality – and hackers can be anyone from bored teenagers, to criminal organizations… or entire nations that are directly or indirectly attacking other nations.
17 November, 2016
“First and foremost, we need to raise the level of awareness of the information our systems and networks contain. Security isn’t just about developing technical solutions. In a broader perspective it’s about identifying a company’s most vital information and deciding what needs protecting.”
15 November, 2016
Many people are aware of the security risks out there, but our surveys of companies and other organizations suggest that when it comes to cyber security, the level of knowledge is somewhat lacking. So here are a few questions for you to consider, to test your own level of security awareness.