Weekly Executive Summary for Week of May 26, 2017
WannaCry What is it? WannaCry is a worldwide ransomware attack that infected more than 300,000 computers. The WannaCry ransomware searches for and encrypts 176 different file types and asked the ...
Weekly Executive Summary for Week of May 26, 2017
WannaCry What is it? WannaCry is a worldwide ransomware attack that infected more than 300,000 computers. The WannaCry ransomware searches for and encrypts 176 different file types and asked the ...
Weekly Executive Summary for Week of April 21, 2017
Keeping Browsers Updated Mozilla has recently released security updates to address vulnerabilities within Firefox and Firefox ESR. These vulnerabilities would allow attackers to exploit the ...
Weekly Executive Summary for Week of April 14, 2017
Layer 2 Security Best Practices Layered security is the best method in mitigating malicious attacks in a network infrastructure. While there are many aspects in defense in depth, layer 2 ...
Weekly Executive Summary for Week of April 7, 2017
Database Security Securing the back end of any application and/or software is key to ensuring confidentiality, integrity, and availability of the information that is being stored or transported. ...
Weekly Executive Summary for Week of March 17, 2017
Industrial Control Systems Security Best Practices Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are increasingly being targeted by cyber attacks ...
Weekly Executive Summary for Week of March 10, 2017
WordPress Security With the recent vulnerabilities with WordPress, it is always important to ensure that your sites are secure. By following some of the Best Practices provided by WordPress and ...
Weekly Executive Summary for Week of March 3, 2017
Focusing On Basic Security Critical Security Controls With the increasing number of breaches and security incidents, analysts and investigators reveal that the main reason behind these attacks ...
Weekly Executive Summary for Week of February 24, 2017
Data Breach Response Best Practices If a malicious attacker is successful in penetrating your network and extracting sensitive data, there is a need to properly respond to the incident. The ...
Weekly Executive Summary for Week of February 17, 2017
Network Segmentation The basic concept of network segmentation will further secure your network and mitigate network intrusion. Even with today's technologies, there's always a chance that an ...
Weekly Executive Summary for Week of February 10, 2017
Don’t Forget About Your Router With the recent Mirai botnet malware, many wireless connected home devices were infected using default usernames and passwords. The Mirai malware then can turn ...