0 Comments

The Jester... Cyber Batman? Or just another Hacker?

The Jester, Cyber batman or

View Post
0 Comments

Advanced Ip Filtering- What it is

Advanced-Ip filtering is a network security tool that allows or denies network traffic based on geographical location. Sometimes referred to as country filtering or blocking, Advanced-Ip filtering allows your network to choose places in the world from which it will accept network traffic. More importantly, innovative designs in Advanced-Ip Filtering enable new and unparalleled levels of precision ...

View Post
0 Comments

Six Ways To Secure Yourself From Online Assailants

We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed that there’s always another breaking news headline of a company getting hacked, a store getting their data ...

View Post
0 Comments

Kill Chain Tactics In Network Security

Nov 4, 2016

Category: Network Security, cybersecurity

I read a good article on Kill Chain tactics. The article subtile was: What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason I understood the thinking, just not applicable for all businesses. Below is the response I wrote. I thought it would be useful to everyone if you're considering this approach. I ...

View Post
0 Comments

Financial Institutions Network Security Is Being Blinded!

Today, Financial institutions (not limited to) are being over run with security logging and alerting. Each new monitoring and alerting device adds more things to consider when evaluating threats on a daily basis. You would think this would help, and is a good thing? It is and isn't at the same time. We bury our faces in reports, sift log after log for the magic bullet, set up countless alerts on ...

View Post
0 Comments

Small Business: Soft Underbelly Of Security

Small businesses are the glue that keeps the economic machine moving around the world. Billions of us the them daily, from coffee to teeth cleaning. Although statistics vary the US small business is estimated to employ between 43%-51% of the workforce.  That's a big number. In a Ponemon small business study dated early 2013 stated:

View Post
0 Comments

Top 5 Skills for an IT Manager

Nov 4, 2016

Category: It, Manager, Skills

Today's IT manager faces a diverse range of challenges, from the complexity of enterprise software to the rapidly evolving threats posed by hackers and malware. As a result, IT managers need a particular set of skills to retain control over their company's IT systems and make the technology work hard for the business. Here are the top five skills that you need to succeed as an IT manager today.

View Post
0 Comments

What Countries Should I Block?

Country Blocking is a bit tricky using traditional methods, and a broad stroke approach will be followed with headaches the more and more you block. Not mentioning proxies, which leaves the broad stroke approach a weak methodology, and somewhat a waste of time. Even with the obvious choices of countries that are frequently suggested to block, you run a greater risk of precluding legitimate ...

View Post
0 Comments

The Unavoidable "Whoops" In Network Security

WE all make mistakes, its a human condition, and not curable. In network security when we make mistakes to a configuration, it's referred to as "Fat Fingering". I can say honestly on several occasions in my network youth, while deep into chasing false positives, on gallons of caffeine, and eyes nearly bleeding, I made mistakes.

View Post
0 Comments

Outdated Medical Devices Could Mean Trouble For Patients

Oct 25, 2016

Category: HealthCare, cybersecurity, hack, Breach

In early October, over 100,000 diabetic patients received a notice from Johnson & Johnson that their insulin pumps are at risk of being attacked by various hackers. These hackers are now taking advantage of insulin pump devices by altering the dosage of insulin that is given to the patient.  The mistreat of insulin to any patient could lead to a series of problems for the user. As of 2015, there ...

View Post