Posts for category: Best Practices Weekly Summaries

Weekly Executive Summary For Week of June 2, 2017

Cloak and Dagger attack brings another Android weakness to light What is it? The Cloak and Dagger attack is a technique used to gain control of an Android device.  It was discovered by a team of ...

Weekly Executive Summary for Week of May 26, 2017

WannaCry What is it? WannaCry is a worldwide ransomware attack that infected more than 300,000 computers. The WannaCry ransomware searches for and encrypts 176 different file types and asked the ...

Weekly Executive Summary for Week of April 21, 2017

Keeping Browsers Updated Mozilla has recently released security updates to address vulnerabilities within Firefox and Firefox ESR.  These vulnerabilities would allow attackers to exploit the ...

Weekly Executive Summary for Week of April 14, 2017

Layer 2 Security Best Practices Layered security is the best method in mitigating malicious attacks in a network infrastructure.  While there are many aspects in defense in depth, layer 2 ...

Weekly Executive Summary for Week of April 7, 2017

Database Security Securing the back end of any application and/or software is key to ensuring confidentiality, integrity, and availability of the information that is being stored or transported. ...

Weekly Executive Summary for Week of March 17, 2017

Industrial Control Systems Security Best Practices Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are increasingly being targeted by cyber attacks ...

Weekly Executive Summary for Week of March 10, 2017

WordPress Security With the recent vulnerabilities with WordPress, it is always important to ensure that your sites are secure.  By following some of the Best Practices provided by WordPress and ...

Weekly Executive Summary for Week of March 3, 2017

Focusing On Basic Security Critical Security Controls With the increasing number of breaches and security incidents, analysts and investigators reveal that the main reason behind these attacks ...

Weekly Executive Summary for Week of February 24, 2017

Data Breach Response Best Practices If a malicious attacker is successful in penetrating your network and extracting sensitive data, there is a need to properly respond to the incident.  The ...

Weekly Executive Summary for Week of February 17, 2017

Network Segmentation The basic concept of network segmentation will further secure your network and mitigate network intrusion.  Even with today's technologies, there's always a chance that an ...