top of page

Search


The Monthly Cyber Resilience Series: Email Is Still the Weakest Link
Despite the rise of messaging platforms, collaboration tools, and social media, email remains at the centre of digital communication. That is exactly why it remains the primary entry point for cyberattacks. The reason is simple: email is an open system. Anyone can send a message to anyone. At the same time, people are conditioned to read and respond quickly, often without careful verification. Attackers exploit this. Modern email attacks are no longer obvious. They do not rel
Apr 13


CSEC Connect 2026: From Dialogue to Regional Cyber Resilience
“Information is our strength. Unity is our shield. Resilience is our future” Under the auspices of the NATO Political Engagement Support Cell (PESC), the Cyber Security Excellence Centre (CSEC) organized the conference "Connect 26". The second edition of CSEC Connect brought together national CERTs/CSIRTs, policymakers, academia, and international partners to address a simple but urgent question: can the Western Balkans become resilient if it remains fragmented? The short an
Mar 25


The Monthly Cyber Resilience Series: Patch Management, Endpoint Protection and Hardening Essentials
Most people know they should update their devices, but not why it matters so much. All software contains flaws. Some of these flaws allow attackers to take control of systems. When vendors release updates, they are fixing known vulnerabilities. The problem is timing: attackers begin exploiting those vulnerabilities almost immediately. Delaying updates effectively means leaving the door open. Technical and Practical Approach 1. Patch Management Define clear timelines: Critical
Mar 23


The Monthly Cyber Resilience Series: Your Laptop Is the New Front Door
When people think about cybersecurity, they often imagine hackers, complex systems, or advanced attacks. Rarely do they think about the most critical component: their own device. Your laptop or computer is the gateway to everything - email, documents, cloud services, internal systems. If that device is compromised, even strong passwords and MFA can be bypassed. Most modern attacks do not start by breaking into systems. They start by compromising devices through: malicious fil
Mar 9


The Monthly Cyber Resilience Series: MFA Done Right: Practical Setup and Common Pitfalls
If passwords are the weakest link, Multi-Factor Authentication (MFA) is the simplest and most effective reinforcement. MFA means proving your identity using at least two different factors: Something you know (password) Something you have (phone, hardware key) Something you are (biometrics) Even if a password is stolen through phishing or a data breach, MFA can stop the attacker from accessing the account. However, not all MFA is equal. Many organisations introduce MFA and ass
Feb 22
bottom of page
