May 13th, 2020

Visibility and Control at the Application Layer

In the past, the axiom, “humans are the weakest link,” was the battle cry of many cyber security professionals. Users, that is, non-security employees, were constantly doing “dumb” things in the eyes of the practitioner. More recently, though, security practitioners have realized that labeling..

May 13th, 2020

How Insider Threats Pose A Major Security Risk

Historically, data breaches that make the news are typically carried out by outside attacks, however; the frequency and cost of insider-related cyber attacks have increased over the last few years.

April 22nd, 2020

Maze Ransomware Attacks Are Increasing

A new strain of ransomware known as Maze is disrupting organizations around the world.

April 13th, 2020

How to Protect Remote Workers From Cyber Threats

Over the last month, we have observed a major shift in the way businesses and organizations communicate internally. As millions of new users are introduced to remote-collaboration tools, the risks associated with these services continue to increase.

April 8th, 2020

Beware of Federal Stimulus Package Scams

The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with the Covid-19 news cycle. While many of you might already be familiar with the fake Center for Disease Control and World Health Organization emails, we..

April 3rd, 2020

How Safe is Zoom?

Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing software applications on the market. Over the last month, the use of this platform has spiked amid the Covid-19 pandemic as businesses,..

March 16th, 2020

The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google Chrome. Most assume that Chrome extensions are nothing more than a combination of JavaScript and HTML files..

January 8th, 2020

Hardening Windows 7 after January 14th, 2020

The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the inability to carry out security updates.

January 7th, 2020

Why Small Businesses Have Become Targets of More Cyber-Attacks Than Large Enterprises

Thousands of computers that belong to customers of managed services providers (MSPS) have suffered from ransomware attacks over the last year. Often times, this begins with a phishing email that leads to a compromising installation of malware, or the bad guys find an open avenue to exploit on a..

August 18th, 2019

Threatlocker Enables the Essential Eight

ThreatLocker’s application whitelisting and ringfencing technology has grown by leaps and bounds and we have observed the adoption of this approach to security in Australia. We thought it was worth the effort to provide a quick breakdown of how ThreatLocker can enable this critical strategy for..

August 12th, 2019

How Application Whitelisting and Ringfencing protects you from BlueKeep RDP vulnerability

The latest “oops” moment for Microsoft is the discovery that an attacker can infect a connecting machine with malware from a Remote Desktop Session. Every few months a new vulnerability is discovered in Windows. Generally, by the time the vulnerability is public knowledge, Microsoft has released..

August 1st, 2019

Anti-Vaxxing and Cyber Security

I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.
Prev 1 2 3 Next