Menu
Offerings
Back
Offerings
Networking
We can help you select, implement, operate, and optimise new technologies into your solution in its entire lifecycle.
Read more
Cybersecurity
We cover all aspects of your environment, from physical security, infrastructure, and applications, to staff security awareness education.
Read more
Data center & cloud
On-prem, private, hyper or multi-cloud? Our data center and cloud experts can work with you to evolve your data center and operations into a flexible and risk-proof IT environment.
Read more
Solutions
Back
Solutions
Networking
Today, the network touches everything in any company. This makes it an ideal platform for improving security and business efficiency.
Read more
Network Automation
Automate manual tasks, and your ICT will be more agile, faster, and flexible. Achieved with lower operational costs and fewer resources.
Read more
Local Area Network
Remote workplaces add more requirements to the local network and make it your company’s heart.
Read more
Wireless network
We have a long track record of implementing indoor and outdoor wireless networks in all industries.
Read more
WAN and Service provider networks
When your network is serving large companies, and their customers, requirements are equally big.
Read more
Cybersecurity
Cyber Security is not only about avoiding risk. A proper security setup also helps your business stay ahead.
Read more
Network Security
Networks are one of the best battlegrounds to stop, contain, or detect attacks.
Read more
Endpoint Protection
Protecting your endpoint devices from cyber threats is vital to prevent and limit damage to your business.
Read more
Conscia Maturity Assessment
Conscia’s Maturity Assessment is a full-service package that provides you with tailored insights and actionable recommendations.
Read more
Conscia ThreatInsights
Get weekly updates about incidents, exploits, malware, and other cybersecurity relevant information from our Threat Intelligence and Reverse Engineering experts.
Read more
Data Center & Cloud
For organisations aiming to stay ahead, choosing the right Data Center and Multicloud solutions is crucial.
Read more
Public, Private and Hybrid Cloud
Increase flexibility with public, private and hybrid cloud solutions.
Read more
Software-defined Network (SDN) for data centers
Build a more secure, more manageable and better-performing network.
Read more
Server
It used to be all about capacity and performance, but today organisations should demand more from their server platforms.
Read more
Storage
From traditional disc storage to server-based storage and cloud storage: The options in the area are plenty.
Read more
Digital Workspace
In the age of mobility and cloud, information has become available to employees from any device and any place.
Read more
Services
Back
Services
Managed Services
Simple, Flexible, and Scalable Services that support your legacy infrastructure.
Read more
Managed Network Services
Our Network Operations Center (NOC) monitors complex networks, detects faults, solve problems immediately, and more.
Read more
Managed Security Services
Advanced managed detection and response services, provided by a Security Operations Center (SOC), enable you to minimize risks and costs by detecting IT security threats at an early stage
Read more
Managed Datacenter & Cloud services
Let us manage the operation of your Cloud platform. Our certified consultants are ready with on-call 24-hour support – all year round.
Read more
Service & Support
Secure immediate access to highly qualified help in case of incidents and support the preparation of a long-term plan for managing network devices.
Read more
Conscia Care
Conscia Care is the cornerstone and foundation for stable operations.
Read more
Expertise Consultancy
Get access to operational consultants with long experience and heavy competencies within network infrastructure.
Read more
Conscia Network Services (CNS)
Our award-winning Customer Service Platform, we offer automated asset management for even the most complex infrastructures.
Read more
Conscia Education services
Upskill your employees in the latest Cisco technologies to ensure you deliver on your promises.
Read more
Industry cases
Careers
About us
Back
About us
About Conscia
Read more
Conscia Leadership
Read more
Partners & Awards
Read more
Sustainability
Read more
Pressroom
Read more
News
Login
Login to CNS
Search for:
Choose your local market:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Search for:
Search
Login
Login to CNS
Contact
Get the
latest insights
in our blog, written by
our own experts
.
Home
»
Articles
Show all
Cases
Events
Blogs
Recorded webinars
Guides
Press releases
Whitepapers
Show Filters
Industries
All
Education
Energy/Utilities
Local Government / Municipalities
Solutions & Services
AI
Analytics
Automation
Cloud
Compliance
Conscia Service Portal
Cybersecurity
Data Center
Internet of Things (IoT)
Lifecycle Advisory
Managed Services
Mobility
Networking
NIS2
Observability
SASE
sd-wan
Services
SOC
Software
Threat Intelligence
Unified Communication
Wireless
Business outcome
Cost Predictability
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
David Kasabji
Principal Threat Intelligence Analyst
Blog
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
6. December 2022
Criminals don’t like to leave traces. In the cyber world, that means deleting their malicious software from your environment after the attack or infiltration. This can significantly limit the ability...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Insider Threats: What are they and how to mitigate them
20. September 2022
While often neglected, an organization’s own personnel pose one of the biggest threats to its security. Human error...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Diving Deep: How to detect Malware Persistency pt. 1
3. August 2022
During a cyber-attack adversaries might gain access to an environment through a certain system, but that might not...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Diving Deep: How to detect Typosquatting
21. June 2022
Typosquatting is a type of social engineering attack where a threat actor registers domains with deliberately misspelled names...
Read more
Tom Kern
Senior Cyber Security Analyst and Researcher
David Kasabji
Principal Threat Intelligence Analyst
Blog
Vulnerability Spotlight: How to detect Follina the Windows MSDT 0-day
1. June 2022
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th,...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Diving Deep: Malware Injection Techniques – Part 1
31. May 2022
Malware Injection Techniques This is the first entry in the Malware Injection Techniques article series that we will...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Conti Ransomware Gang falls apart
1. May 2022
Conti ransomware gang was infamously known as one of the most sophisticated adopters of ransomware-as-a-service (RaaS) model, earning...
Read more
Contact
Contact us now