IT Cybersecurity Services From Secure Networkers
Cyber Incident & Response


A Stormy Month in the Rackspace Cloud
If you are not already familiar with the story, Rackspace is a cloud provider recently hit by a ransomware attack. It disrupted their customers’ ability to access their email accounts because the ransomware targeted the Hosted Exchange environment. After weeks of...

Consider a Cyber Review of 2022
Over the course of the past year, our monthly articles have focused on a variety of elements that lead to reliable network security, including: The importance of having a Managed Security Service Provider (MSSP). That endpoint protection is a critical,...

Log4j Behavior Detection and Mitigation
Todd is a Marine Corps veteran with 6 years of service. He and his wife Kerri founded Secure Networkers in 2010 with a desire to achieve success with his uncanny ability to “think outside the box.” He has an unwavering persistence in finding data security solutions in...

IT Incident Response Playbook
What is an Incident Response Playbook? The short answer is that it’s a set of instructions to follow when the unexpected occurs. These instructions are relevant to just about any situation that a business may face. They can encompass things like “what to do if our CEO...

Ransomware Decision: to Pay or Not to Pay
The debate has been raging for a while. When ransomware hits an organization, the decision must be made: “to pay up or not to pay up.” While it is easy to think of the dilemma strictly in academic terms, when not actually facing the crisis, the reality of a ransomware...

Iran Cyberattacks, Up to 10,000 Per Minute
Texas governor Greg Abbott provided a formal address yesterday (January 7, 2020) regarding the state of affairs with Texas cybersecurity. Our own Texas DIR has been monitoring cyber activity across Texas, and has found up to 10,000 attempted attacks per minute from...

Data Hackers: Why Cyber Attackers Want Your Data
"Why would hackers want my data?" It's the common question asked by those who we help remediate after an attack. The answer is not complicated. Put simply: if your data is accessible, they'll take it. This article explains: What motivates attackers to attack you, The...

Post Cyber Attack: Remediation with No Visibility
It is always after the security breach happens when a businesses learns that their firewall and anti-virus solution had an unprotected flaw - the flaw that became an adversary's attack vector. Can you ever have confidence in network security and protection measures?...

“Pulling Back the Curtain” – Rootkit Detection and Removal
Rootkits may use any of a number of techniques to gain control of a system. We touched on this in “Man Behind the Curtain” introduction to Rootkit Malware, that rootkits come in different makes and models, and the type of rootkit will determine the choice of attack...

“Man Behind the Curtain” – Rootkit Malware
Definition of a Rootkit A rootkit is a set of software tools designed to reside in the top-level directory (the "root") of a file system. Rootkits can be used to detect attacks and provide anti-theft defenses. But because they can also enable unauthorized users to...