Subscribe to our blog!

Post by Category

0 Comments

Top 6 Cyber-Security Predictions for 2017

Jan 27, 2017

Category: cybersecurty, malware, Predictions, 2017

What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what we here at PacketViper are saying about the year ahead — and what you can do to prepare.

View Post
0 Comments

5 DDoS Prevention Tips

Jan 26, 2017

Category: DDoS

DDoS (distributed denial of service) Attacks can happen out of nowhere and leave a trail of complications for all in its wake. Popular Companies Such as Microsoft, Amazon, and Netflix are just 3 out of the thousands of companies who have been affected by these cyber incursions. While Stopping a DDoS attack before it happens can be difficult , Taking every precaution to help prevent one is not. ...

View Post
0 Comments

IoT Devices and Their impact on 2017

2016 was the know only as the "Year of the Hacker". Cybersecurity is no longer a side priority. As cyber terrorists continue to perform DDoS Attacks and hold companies for hostage via Ransomware we're left wondering "How exactly did they breach our systems". Many would say the "Internet of Things" the "Internet of Things". What is it exactly? Well... the "Internet of Things" are everyday ...

View Post
0 Comments

"Every minute of every day, a bank is under cyber attack"

Dec 7, 2016

Category: Breach, Hacker, Cyber, Bank, Money, Data

View Post
0 Comments

Virtual Grinches Are Trying to Steal Your Christmas

For most people, it is their favorite time of the year. We have waited roughly 365 days for stores to have endless sales, in-store and online coupons, and deals we can't pass up to buy for our family, friends, loved ones, or simply for us. We are all guilty of going to a store and pulling out our electronic devices and typing in on the internet, "coupons for ..." and doing a quick search to see ...

View Post
0 Comments

The Jester... Cyber Batman? Or just another Hacker?

The Jester, Cyber batman or

View Post
0 Comments

Advanced Ip Filtering- What it is

Advanced-Ip filtering is a network security tool that allows or denies network traffic based on geographical location. Sometimes referred to as country filtering or blocking, Advanced-Ip filtering allows your network to choose places in the world from which it will accept network traffic. More importantly, innovative designs in Advanced-Ip Filtering enable new and unparalleled levels of precision ...

View Post
0 Comments

Six Ways To Secure Yourself From Online Assailants

We are now in a day of age where we have access to absolutely everything at the tip of our fingers.  With technology so advanced, we can easily check and send emails, shop, surf the web and so much more; but, this also puts a target on our back for stolen information. Have you noticed that there’s always another breaking news headline of a company getting hacked, a store getting their data ...

View Post
0 Comments

Kill Chain Tactics In Network Security

Nov 4, 2016

Category: Network Security, Cybersecurity

I read a good article on Kill Chain tactics. The article subtile was: What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason I understood the thinking, just not applicable for all businesses. Below is the response I wrote. I thought it would be useful to everyone if you're considering this approach. I ...

View Post
0 Comments

Financial Institutions Network Security Is Being Blinded!

Today, Financial institutions (not limited to) are being over run with security logging and alerting. Each new monitoring and alerting device adds more things to consider when evaluating threats on a daily basis. You would think this would help, and is a good thing? It is and isn't at the same time. We bury our faces in reports, sift log after log for the magic bullet, set up countless alerts on ...

View Post