Posts for category: Best Practices

Securing a Home Network

Background: Most day-to-day tasks are normally done from the safety of home. Tasks include: checking your banking statements, paying bills, reading emails, chatting on social media, or simply ...

Do You Need a Cyber Insurance Policy?

Background The first Cyber Insurance (CI) policies were developed for businesses in the late 1990s because of the multitude of emerging technologies that were present at that time, most notably the ...

How to Install Kali Linux as an App in Windows 10

Introduction Recently Kali Linux was released as an application in the Microsoft Store.  Through utilization of the Windows Subsystem for Linux (WSL) compatibility layer, its now possible to ...

Examining the Threat of DDoS

Background Roughly fifteen years ago as broadband internet was beginning to expand throughout North America, I like many other teenagers was reaping the benefits as an avid online gamer.  When ...

Strengthening IoT Security

The IoT Threat The Internet of Things (IoT) is growing rapidly with each new product cycle and presents serious cause for concern with regards to information security.  Over the last several ...

Protecting Against Data Destruction Attacks

Olympic Destroyer Recently, a string of cyber attacks disrupted services and caused a multitude of IT-related issues at the Winter Olympics in PyeongChang.  While who is behind the attacks ...

Spectre and Meltdown: What You Need to Know and How to Protect Yourself

What are Spectre and Meltdown? [caption id="attachment_6961" align="alignright" width="400"] Source: Gizmodo[/caption] Earlier this year security researchers made public the discovery of ...

Trouble in Paradise: Hawaii Emergency Mismanagement

[caption id="attachment_6897" align="alignleft" width="225"] Source: Wired[/caption] On Saturday January 13, 2018, people in the Hawaiian islands found themselves in the midst of a large-scale ...

Defense Strategy for BYOD Networks

  [caption id="attachment_6777" align="alignright" width="300"] Source: Xyfon Managed IT[/caption]   Bring your own device (BYOD) is a trend that has grown increasingly common over the ...

Critical macOS High Sierra Root Flaw

This week, a critical and baffling vulnerability has been discovered lurking within macOS High Sierra that allows users to gain full access (root) to your Mac without a password or any type of ...