Posts for category: Best Practices

Weekly Executive Summary for Week of June 30, 2017

ExPetr Wiper Malware What is it? A new variation of Petya malware has spread across the world and infected Windows PCs used in critical industries.  It is thought to have initially spread via ...

Weekly Executive Summary for Week of June 23, 2017

Nigerian Business Email Compromise Attacks What is it? Over the past several months, researchers at Kaspersky have seen over 500 companies in 50 countries get attacked by Nigerian phishing ...

Weekly Executive Summary For Week of June 16, 2017

Securing your home router When it comes to home network security, many people do not realize how vulnerable their routers are.  Listed below are some ways you can secure your home router. Keep in ...

Weekly Executive Summary For Week of June 9, 2017

Fireball Adware Infects 250 Million What is it? Researchers at Check Point have discovered that Rafotech, a Chinese digital marketing company, has been running a massive adware campaign that has ...

Weekly Executive Summary For Week of June 2, 2017

Cloak and Dagger attack brings another Android weakness to light What is it? The Cloak and Dagger attack is a technique used to gain control of an Android device.  It was discovered by a team of ...

Weekly Executive Summary for Week of May 26, 2017

WannaCry What is it? WannaCry is a worldwide ransomware attack that infected more than 300,000 computers. The WannaCry ransomware searches for and encrypts 176 different file types and asked the ...

Weekly Executive Summary for Week of April 21, 2017

Keeping Browsers Updated Mozilla has recently released security updates to address vulnerabilities within Firefox and Firefox ESR.  These vulnerabilities would allow attackers to exploit the ...

Weekly Executive Summary for Week of April 14, 2017

Layer 2 Security Best Practices Layered security is the best method in mitigating malicious attacks in a network infrastructure.  While there are many aspects in defense in depth, layer 2 ...

Weekly Executive Summary for Week of April 7, 2017

Database Security Securing the back end of any application and/or software is key to ensuring confidentiality, integrity, and availability of the information that is being stored or transported. ...

Weekly Executive Summary for Week of March 17, 2017

Industrial Control Systems Security Best Practices Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems are increasingly being targeted by cyber attacks ...