Menu
Offerings
Back
Offerings
Networking
We can help you select, implement, operate, and optimise new technologies into your solution in its entire lifecycle.
Read more
Cybersecurity
We cover all aspects of your environment, from physical security, infrastructure, and applications, to staff security awareness education.
Read more
Data center & cloud
On-prem, private, hyper or multi-cloud? Our data center and cloud experts can work with you to evolve your data center and operations into a flexible and risk-proof IT environment.
Read more
Solutions
Back
Solutions
Networking
Today, the network touches everything in any company. This makes it an ideal platform for improving security and business efficiency.
Read more
Network Automation
Automate manual tasks, and your ICT will be more agile, faster, and flexible. Achieved with lower operational costs and fewer resources.
Read more
Local Area Network
Remote workplaces add more requirements to the local network and make it your company’s heart.
Read more
Wireless network
We have a long track record of implementing indoor and outdoor wireless networks in all industries.
Read more
WAN and Service provider networks
When your network is serving large companies, and their customers, requirements are equally big.
Read more
Conscia PowerSave
By automatically disabling wireless networks when not in use, Conscia PowerSave helps to reduce energy consumption, carbon footprint, and costs.
Read more
Cybersecurity
Cyber Security is not only about avoiding risk. A proper security setup also helps your business stay ahead.
Read more
Network Security
Networks are one of the best battlegrounds to stop, contain, or detect attacks.
Read more
Endpoint Protection
Protecting your endpoint devices from cyber threats is vital to prevent and limit damage to your business.
Read more
Conscia Maturity Assessment
Conscia’s Maturity Assessment is a full-service package that provides you with tailored insights and actionable recommendations.
Read more
Conscia ThreatInsights
Get weekly updates about incidents, exploits, malware, and other cybersecurity relevant information from our Threat Intelligence and Reverse Engineering experts.
Read more
Data Center & Cloud
For organisations aiming to stay ahead, choosing the right Data Center and Multicloud solutions is crucial.
Read more
Public, Private and Hybrid Cloud
Increase flexibility with public, private and hybrid cloud solutions.
Read more
Software-defined Network (SDN) for data centers
Build a more secure, more manageable and better-performing network.
Read more
Server
It used to be all about capacity and performance, but today organisations should demand more from their server platforms.
Read more
Storage
From traditional disc storage to server-based storage and cloud storage: The options in the area are plenty.
Read more
Digital Workspace
In the age of mobility and cloud, information has become available to employees from any device and any place.
Read more
Services
Back
Services
Managed Services
Simple, Flexible, and Scalable Services that support your legacy infrastructure.
Read more
Managed Network Services
Our Network Operations Center (NOC) monitors complex networks, detects faults, solve problems immediately, and more.
Read more
Managed Security Services
Advanced managed detection and response services, provided by a Security Operations Center (SOC), enable you to minimize risks and costs by detecting IT security threats at an early stage
Read more
Managed Datacenter & Cloud services
Let us manage the operation of your Cloud platform. Our certified consultants are ready with on-call 24-hour support – all year round.
Read more
Service & Support
Secure immediate access to highly qualified help in case of incidents and support the preparation of a long-term plan for managing network devices.
Read more
Conscia Care
Conscia Care is the cornerstone and foundation for stable operations.
Read more
Expertise Consultancy
Get access to operational consultants with long experience and heavy competencies within network infrastructure.
Read more
Conscia Network Services (CNS)
Our award-winning Customer Service Platform, we offer automated asset management for even the most complex infrastructures.
Read more
Industry cases
Careers
About us
Back
About us
About Conscia
Read more
Conscia Leadership
Read more
Partners & Awards
Read more
Sustainability
Read more
Pressroom
Read more
News
Login
Login to CNS
Search for:
Choose your local market:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Search for:
Search
Login
Login to CNS
Contact
Get the
latest insights
in our blog, written by
our own experts
.
Home
»
Blog
Show all
Cases
Events
Blogs
Recorded webinars
Guides
News
Press releases
Whitepapers
Show Filters
Industries
All
Education
Energy/Utilities
Local Government / Municipalities
Solutions & Services
AI
Analytics
Automation
Cloud
Compliance
Conscia Service Portal
Cybersecurity
Data Center
Internet of Things (IoT)
Lifecycle Advisory
Managed Services
Mobility
Networking
NIS2
Observability
SASE
sd-wan
Services
SOC
Software
Threat Intelligence
Unified Communication
Wireless
Business outcome
Cost Predictability
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
David Kasabji
Principal Threat Intelligence Engineer
Blog
Diving Deep: How to detect Typosquatting
21. June 2022
Typosquatting is a type of social engineering attack where a threat actor registers domains with deliberately misspelled names of known brands or websites and hosts malicious content on them or...
Read more
Tom Kern
Senior Cyber Security Analyst and Researcher
David Kasabji
Principal Threat Intelligence Engineer
Blog
Vulnerability Spotlight: How to detect Follina the Windows MSDT 0-day
1. June 2022
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th,...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Diving Deep: Malware Injection Techniques – Part 1
31. May 2022
Malware Injection Techniques This is the first entry in the Malware Injection Techniques article series that we will...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Ransomware-as-a-Service: An infamously lucrative business model
18. May 2022
Ransomware as a type of malware is not a 21st century invention. We can trace it back to...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Conti Ransomware Gang falls apart
1. May 2022
Conti ransomware gang was infamously known as one of the most sophisticated adopters of ransomware-as-a-service (RaaS) model, earning...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
Increased threat against industries leveraging ICS and SCADA devices
14. April 2022
US agencies (CISA, NSA, FBI) and Department of Energy issued a new Cybersecurity Advisory (CSA) warning on 13.04.2022...
Read more
Johan Camps
Sr. Product Manager, Managed Services, Conscia
Blog
Secure access anywhere: Secure SD-WAN as a Service
5. April 2022
We are in the midst of the biggest change since industrialization; huge amounts of IT are currently moving...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
What you need to know about the increased Digital Risks following the cyber-attacks on Ukraine
16. March 2022
Amidst the ongoing warfare, we were able to track the development of new dedicated and tailored malware (HermeticWiper...
Read more
Henrik Møll
CTO, Conscia Denmark
Blog
SASE – Buzzword or an intelligent road for cloud security?
28. February 2022
Read all about what SASE is and how it can be the solution for your IT security in...
Read more
Jesper Erbs
System Engineer
Blog
Critical Vulnerability in Apache Log4j
13. December 2021
A critical vulnerability has been discovered in Apache Log4j (CVE-2021-22448), which has a maximum CVSS score of 10....
Read more
Daniel Bo Hede
Security Analyst
Henrik Skovfoged
Blog
Is your Active Directory secure?
1. September 2021
How do you discover and assess misconfigurations and newly discovered vulnerabilities in your most critical asset – Active...
Read more
Mikael Juul
Product Manager, Service Applications
Blog
CNS Insights: Welcome to the jungle
19. June 2021
Today, all parts of any organisation are attached to its’ network. At Conscia, we have worked with mapping...
Read more
Henrik Skovfoged
Blog
CIS Controls version 8
15. June 2021
Center for Internet Security (CIS) has recently updated the CIS controls (May 2021) and we no longer have...
Read more
Henrik Skovfoged
Blog
Where and how to begin the cyber security journey?
18. May 2021
Where to start? Many European organizations struggle to start the cyber security journey. Most of the organizations know...
Read more
Emanuel Lipschütz
CCIE
Blog
Major security mistake costs businesses millions
17. May 2021
Cybersecurity is on the board agenda for all companies or should at least be there. Everyone understands the...
Read more
Emanuel Lipschütz
CCIE
Blog
Cutting corners in cyber security will backfire
12. May 2021
Managers at manufacturing companies experience how IT, digitalization, call it what you want, washes over them at an...
Read more
Blog
Cloud Managed Next Generation Firewall-as-a-Service
4. May 2021
Network security is an unfair game. To protect your business, users, and data, you employ a number of...
Read more
Jakob Premrn
Cybersecurity Analyst
Blog
PODCAST: Who are hackers and what do they want?
28. April 2021
In this first episode of the Cybersec Bites Podcast, Jakob Premrn, Cybersecurity Analyst from NIL’s Security Operations Center (SOC),...
Read more
Lars Cederholm
CCIE
Blog
Data is gold – protect it
27. April 2021
By using new technologies in our everyday lives, enormous amounts of data are produced. 59 zettabytes of data were...
Read more
Jeffrey den Oudsten
CTO Office Solutions Director, Conscia Netherlands
Blog
Major Step forward in delivering IT-as-a-Service
30. March 2021
For almost twenty years, Conscia has been a leading European provider of secure, reliable IT infrastructure. With a...
Read more
Blog
Data Abundance
30. March 2021
By using new technologies in our everyday lives, enormous amounts of data are produced. 59 zettabytes of data were...
Read more
Simon Bastian
Senior Mobility Specialist
Casper Hviid
Senior Mobility Consultant
And more
Blog
Android 11 and MDM support
4. March 2021
More than 60% of mobile devices in Denmark is powered by Android operating system. A large part of...
Read more
Blog
What is Wi-Fi 6E? – A big step forward in Wi-Fi communication
11. February 2021
It is like a famous children’s song ‘Twelve little monkeys jumping on the bed, one fell off and...
Read more
Esther Hovenkamp
Account Manager, Security, Conscia Netherland
Blog
Education and research institutions are more vulnerable than ever
26. January 2021
Education and research institutions are more vulnerable than ever and a significant target for cybercriminals. Indeed, in these...
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager, NIL
Blog
Firefighting Cyberattacks
19. December 2020
If you’ve been feeling depressed about the Covid-19 crisis lately, we’ve got news for you – cybercrime represents...
Read more
Jon-Anders Frigård
Senior IT Architect, CCIE and Security Expert at Conscia Norway
Blog
Lateral Movement – advanced cyber crime
4. May 2020
Lateral Movement is a technology that cybercriminals use to move in a hijacked network. The movements look like...
Read more
Danijel Grah
Cybersecurity Analyst at NIL (part of Conscia Group)
Blog
First steps toward ICS/OT Security
27. April 2020
How ICS and OT targeted attacks became a serious threat Industrial Control Systems (ICS) and Operation Technology (OT)...
Read more
Tom Kern
Senior Cyber Security Analyst and Researcher
Blog
What is a Threat Detection Framework?
21. April 2020
In today’s world of increasing complexity and lucrative cybercrime industry, you can only be certain of one thing:...
Read more
Jesper Erbs
System Engineer
Blog
3 main things to consider when an incident occurs
17. March 2020
Incident response What happens if the IT heart attack button is pressed? Do the IT personnel know what...
Read more
David Kasabji
Principal Threat Intelligence Engineer
Blog
WannaTry again? SMBv3 Vulnerability Awakes!
11. March 2020
SMBv3 vulnerability (CVE-2020-0796) explained and how to defend against zero-day attacks We have just learned about a new...
Read more
Henrik Skovfoged
Blog
5 takes on what impact the Human element has on Cyber Security
5. March 2020
From the RSA Security Conference, which took place from the 24-28 February in the Moscone Center in San...
Read more
Henrik Skovfoged
Blog
GRC: How IT departments can put IT Security on the corporate agenda (Part 2)
26. February 2020
Cyber Security on corporate agenda A string of major companies is learning it the hard way these years;...
Read more
Henrik Skovfoged
Blog
GRC: How IT departments can put IT Security on the corporate agenda (Part 1)
19. February 2020
Cyber Security on corporate agenda A string of major companies is learning it the hard way these years;...
Read more
Henrik Skovfoged
Blog
To SIEM or not to SIEM
31. January 2020
In my last article I was arguing for more focus on detection and response instead of a single...
Read more
Mikael Gustafsson
Mikael Gustafsson
Blog
Login – the problem that never disappears. Now there is a possibility!
28. January 2020
Credentials cause a lot of problems. With Duo Security, not anymore. Credentials, credentials, a lot of authentications happen...
Read more
Blog
DNS: High security with low costs
7. November 2018
For more than a decade, OpenDNS has been among the world’s most used DNS services and is still...
Read more
Blog
Eka-what? Ekahau!
23. August 2018
Wireless networks today require that we wring every drop out of the cloth. Users today expect to work...
Read more
«
1
2
3
Contact
Contact us now