Search Results for: security protocols Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post An IoT Leak Impacts On 2.4 Million Customers December 27, 2019 Today, an IoT company named Wyze announced and confirmed a server leak led by an accidentally exposed internal database. This... Blog Post How to Protect Against Insider Risk? June 8, 2021 Cybercriminals and external threats pose plenty of challenges for organizations. Responding to the threats, nearly every organization puts in the... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Blog Post What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also... Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Blog Post Apple, Google, Microsoft Join Forces to Kill Legacy Web Security Protocol October 17, 2018 A number of technology giants including Google, Microsoft, Apple and Mozilla are coming together to put an end of TLS... Blog Post What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made.... Blog Post Implementing a Security Awareness Program at Your Organization February 25, 2020 Here are the lines of defense in your organization: The 1st Line: Controls – how you enforce security best practices... Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Blog Post DoorDash Hit With Data Breach October 3, 2019 DoorDash confirmed in blog post a major data breach involving 4.9 customers, delivery workers, and merchants. The breach was discovered...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post An IoT Leak Impacts On 2.4 Million Customers December 27, 2019 Today, an IoT company named Wyze announced and confirmed a server leak led by an accidentally exposed internal database. This...
Blog Post How to Protect Against Insider Risk? June 8, 2021 Cybercriminals and external threats pose plenty of challenges for organizations. Responding to the threats, nearly every organization puts in the...
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post What is Address Resolution Protocol (ARP) poisoning? April 14, 2020 ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also...
Blog Post Common Techniques by Which Malware Makes Itself Persistent January 19, 2021 A hacker wants to keep its malware to stay on the target device, even when the operating system restarts. Do you know...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Blog Post Apple, Google, Microsoft Join Forces to Kill Legacy Web Security Protocol October 17, 2018 A number of technology giants including Google, Microsoft, Apple and Mozilla are coming together to put an end of TLS...
Blog Post What is The Ryuk Ransomware June 7, 2019 Ransomware is a malware attack which takes over a user’s computer and threatens harm, if a payment is not made....
Blog Post Implementing a Security Awareness Program at Your Organization February 25, 2020 Here are the lines of defense in your organization: The 1st Line: Controls – how you enforce security best practices...
Blog Post Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Blog Post DoorDash Hit With Data Breach October 3, 2019 DoorDash confirmed in blog post a major data breach involving 4.9 customers, delivery workers, and merchants. The breach was discovered...