by Katherine Parker | Dec 11, 2019 | Cyber Incident and Response
“Why would hackers want my data?” It’s the common question asked by those who we help remediate after an attack. The answer is not complicated. Put simply: if your data is accessible, they’ll take it. This article explains: What motivates...
by Katherine Parker | Nov 15, 2019 | Cyber Incident and Response
It is always after the security breach happens when a businesses learns that their firewall and anti-virus solution had an unprotected flaw – the flaw that became an adversary’s attack vector. Can you ever have confidence in network security and protection...
by Katherine Parker | Jul 31, 2019 | Cyber Incident and Response, IT Security
Rootkits may use any of a number of techniques to gain control of a system. We touched on this in “Man Behind the Curtain” introduction to Rootkit Malware, that rootkits come in different makes and models, and the type of rootkit will determine the choice of attack...
by Katherine Parker | Jul 25, 2019 | Cyber Incident and Response, IT Security
Definition of a Rootkit A rootkit is a set of software tools designed to reside in the top-level directory (the “root”) of a file system. Rootkits can be used to detect attacks and provide anti-theft defenses. But because they can also enable unauthorized...
by Katherine Parker | Jul 9, 2019 | Cyber Incident and Response
When we discuss the problems of malware on industry, our conversations around the water cooler often focus on the symptoms. We discuss the immediate problems experienced by malware: slowing down computers, locking operators out of programs. But there is a cause-effect...
by Katherine Parker | May 31, 2019 | Cyber Incident and Response
Recognizing Those Trouble-Making Emails and Stopping Them in Their Tracks Spoof Spotting Transcript and Slides:Hello! My name is Katherine Parker. I represent Secure Networkers, a business dedicated to help businesses navigate through the often perilous terrain of...