Posts for category: Best Practices

Agricultural Supply Chain Attack

(By: William Beard on September 30, 2021) Executive Summary The agricultural sector has been hit with yet another cyberattack in 2021. New Cooperative a Iowa based grain collective was hit ...

Apple Zero Click iMessage Exploit

(By: William Beard on September 17, 2021) Executive Summary Citizen Labs, a research group at the University of Toronto recently discovered a vulnerability in all of Apple’s operating ...

Security+ SY0-501 Domain 3 Architecture and Design: A look into Proper Input Validation

(By: Guy Nguyen-Phuoc on March 3, 2021) Introduction The best way to stop a disaster is to prepare for it and cyber disasters are no different. Architecture and design, defined by the ...

Security+ SY0-501 Domain 4 Identity and Access Management: A look into common account management practices

(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction In 2016, the Central Intelligence Agency (CIA) experienced a data breach containing up to 34 terabytes of data (34,000,000,000,000 ...

Security+ SY0-501 Domain 2 Technologies and Tools: a look into weak security configurations

(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction CISA (Cybersecurity & Infrastructure Security Agency) released an alert from their National Cyber Awareness System on April 29, ...

Security+ SY0-501 Domain 6 Cryptography and PKI: A look into AES and Encryption

(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction April 20, 2020. The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) ...

Responding to a Cyber Security Incident

What is a Cyber Security Incident? A Cyber Security Incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security ...

Romance Scams: True Deception

On February 12, 2019, The Federal Trade Commission (FTC) release an article warning of the dangers of the Romance Scams.  In a Romance Scam, cyber criminals gain the confidence/trust of their ...

Domain Name System(DNS)

DNS allows a user to type a Uniform Resource Locator (URL) into the browser which sends the user the requested website. In the background, DNS servers are communicating with each other to resolve ...

Email: Don’t Pass Go!

Businesses are highly affected by email scams. One scam reaching critical level is the W-2 scam.  The scam is aimed toward the HR department of an organization using sophisticated phishing ...