There’s been a lot of noise lately on Reddit and other platforms about how “easy” it is to disable Windows Defender ATP. MSPs are getting questions from clients about this concern. But these discussions are focusing on the wrong issue…
Category: Heimdal Security Blog
The hidden price of free: How businesses’ cost-cutting tech choices compromise your security
Free software is everywhere, used for email, marketing, accounting, scheduling, and even storing customer data. For small businesses under pressure, it’s a tempting way to cut costs and stay afloat. But “free” often comes with strings. Many of these tools…
The evolution of social engineering and the rise of AI-powered cybercrime
Social engineering and AI-driven fraud are climbing to the top of global security concerns. The World Economic Forum lists them among the biggest cybersecurity threats of 2025. And the threat is no longer just spam emails with obvious typos. Today’s scams…
MSPs in 2025: From “Break-Fix to Business Advisor” with Nigel Moore
Welcome back to the MSP Security Playbook, the podcast that helps MSPs cut through the noise, eliminate inefficiencies, and build stronger, more profitable security businesses. I’m your host, Jacob Hazelbaker, business development representative at Heimdal Security, an industry-leading unified and…
When Visibility Meets Action in NHS Cybersecurity
In NHS cybersecurity, one problem keeps security teams up at night: the gap between spotting issues and actually fixing them. If you work in healthcare IT, you know this headache all too well. Legacy systems that can’t be easily patched,…
When Visibility Meets Action in NHS Cybersecurity
In NHS cybersecurity, one problem keeps security teams up at night: the gap between spotting issues and actually fixing them. If you work in healthcare IT, you know this headache all too well. Legacy systems that can’t be easily patched,…
PDF Malware: How Educational Institutions Can Prevent Infection Spreading
Since 2020, there has been a sharp rise in the number of cyberattacks targeting educational institutions. And PDF malware is one of the most common attack vectors. Through my work at Heimdal, I regularly speak with staff at universities, schools,…
EU Adopts New Cybersecurity Rules for Critical Infrastructure Under NIS2 Directive
The post EU Adopts New Cybersecurity Rules for Critical Infrastructure Under NIS2 Directive appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: EU Adopts New Cybersecurity Rules for Critical Infrastructure…
NIS2 Compliance Checklist
The post NIS2 Compliance Checklist appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: NIS2 Compliance Checklist
NIS2 Compliance Checklist
The post NIS2 Compliance Checklist appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: NIS2 Compliance Checklist
EU Adopts New Cybersecurity Rules for Critical Infrastructure Under NIS2 Directive
The post EU Adopts New Cybersecurity Rules for Critical Infrastructure Under NIS2 Directive appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: EU Adopts New Cybersecurity Rules for Critical Infrastructure…
NIS2 Compliance | Challenges, Pain Points and Solutions
The post NIS2 Compliance | Challenges, Pain Points and Solutions appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: NIS2 Compliance | Challenges, Pain Points and Solutions
NIS2 Compliance | Challenges, Pain Points and Solutions
The post NIS2 Compliance | Challenges, Pain Points and Solutions appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: NIS2 Compliance | Challenges, Pain Points and Solutions
How to Negotiate Your NIS2 Fine or Completely Avoid the Risk
The post How to Negotiate Your NIS2 Fine or Completely Avoid the Risk appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: How to Negotiate Your NIS2 Fine or Completely…
5 Best NIS2 Compliance Software and Solution Providers
The post 5 Best NIS2 Compliance Software and Solution Providers appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: 5 Best NIS2 Compliance Software and Solution Providers
How to Prepare for NIS2 Audits – A Compliance Expert’s View
The post How to Prepare for NIS2 Audits – A Compliance Expert’s View appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: How to Prepare for NIS2 Audits – A…
How to Defend Against the 10 Most Dangerous Privileged Attack Vectors
The post How to Defend Against the 10 Most Dangerous Privileged Attack Vectors appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: How to Defend Against the 10 Most Dangerous…
Effective Privileged Access Management Implementation: A Step-by-Step Guide
The post Effective Privileged Access Management Implementation: A Step-by-Step Guide appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: Effective Privileged Access Management Implementation: A Step-by-Step Guide
Heimdal Awarded Patent for Predictive DNS™ Technology
COPENHAGEN, Denmark, April 23, 2025 – Heimdal, a leading European cybersecurity company, today announced that it has been granted U.S. Patent No. 18333620 for a pioneering invention that calculates the probability of a domain being malicious. This milestone reinforces Heimdal’s…
Admin Rights in Action: How Hackers Target Privileged Accounts
The post Admin Rights in Action: How Hackers Target Privileged Accounts appeared first on Heimdal Security Blog. This article has been indexed from Heimdal Security Blog Read the original article: Admin Rights in Action: How Hackers Target Privileged Accounts