by Katherine Parker | Feb 21, 2020 | Data Security, Hacker Prevention, Intrusion Prevention, Malware, Network Security, Network Visibility, Role-based Access Control (RBAC)
“Why us?” This is the common question we hear every time we arrive on the scene to mitigate a network crippled by either a malware that made it into a system, or a hacker who snuck in to do a smash and grab. The answer is, as we have discussed before, that criminals...
by Katherine Parker | Feb 14, 2020 | Data Security, Email Environment Security, General Information, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Malware, Malware Incident Response, MSSP, Network Security, Network Visibility, Secure Data Storage, Uncategorized
For many companies, the need for a tightly secure business network is high, but the budget for making a secure network happen is low. Often times business owners and upper management have to make hard decisions about who they hire to manage these decisions. Seasoned...
by Katherine Parker | Aug 2, 2019 | Data Security, General Information, Malware, Network Security, Penetration Test, Uncategorized
IT News Brief August 2019: The surest way to know whether you can be hacked is by having a hacker go to work on your system. This is called penetration testing, and it is a service we perform. This month we offer a quick little questionnaire that can help you...
by Katherine Parker | Jul 31, 2019 | Malware, Malware Incident Response, Rootkit, Uncategorized
Rootkits may use any of a number of techniques to gain control of a system. We touched on this in “Man Behind the Curtain” introduction to Rootkit Malware, that rootkits come in different makes and models, and the type of rootkit will determine the choice of attack...
by Katherine Parker | Jul 25, 2019 | Device Security, Malware, Mobile Devices, Rootkit, Uncategorized
Definition of a Rootkit A rootkit is a set of software tools designed to reside in the top-level directory (the “root”) of a file system. Rootkits can be used to detect attacks and provide anti-theft defenses. But because they can also enable unauthorized...
by Katherine Parker | Jul 9, 2019 | Data Security, Malware, Network Security, Uncategorized
When we discuss the problems of malware on industry, our conversations around the water cooler often focus on the symptoms. We discuss the immediate problems experienced by malware: slowing down computers, locking operators out of programs. But there is a cause-effect...