Managed Threat

Understanding The Hidden Threats of TOR/Nodes and How to Protect Yourself

Hidden Threats: TOR/Nodes A common misconception on the web is that using the TOR browser will keep you safe from cyber threats. That’s not true. TOR was built for anonymity, not explicitly for security. It’s important to understand the difference if you want to protect your users and your organization. What is TOR? Tor is …

Understanding The Hidden Threats of TOR/Nodes and How to Protect Yourself Read More »

ransomware

The True Cost of SamSam Ransomware in the Hidden Threat

Last year, the city of Atlanta was attacked by a group of hackers who had infiltrated their system and effectively crippled large parts of it. They were not alone. Just last year, the United States indicted two Iranian nationals who, themselves, had carried out over 200 attacks on organizations in the United States & Canada. …

The True Cost of SamSam Ransomware in the Hidden Threat Read More »

DDoS Attacks: The Good, Bad, the Ugly

Denial-of-Service (DoS) and, more commonly Distributed-Denial-of-Service (DDoS) attacks are among the most common cyber threats that exist on the Internet. Recognizing how they work and preventing threat can help to reduce the chance that a DoS attack is carried out against your organization. Or that computers in your organization are unwitting accomplices. What is a …

DDoS Attacks: The Good, Bad, the Ugly Read More »

12 Tips for Securing Your IT Infrastructure

The threats are real. And they’re not just limited to big companies or organizations either. Very often, attackers are using bots to troll the Internet for vulnerabilities. When the bot finds the vulnerability (or an employee engages with a malicious actor), then the attacker exploits that attack vector. So, how do you protect your organization …

12 Tips for Securing Your IT Infrastructure Read More »

What Does Mage.js Have to Do with Your Security?

Do you have an e-commerce website? If so, then you should know about one of the most recent hidden cyber threats from Russia: the mage.js extension. It’s new(ish), it’s nasty, and it infects your website in a nearly undetectable way and compromises your customers’ credit card information. A compromise that you, ultimately, will be liable …

What Does Mage.js Have to Do with Your Security? Read More »

Secure On The Cloud

Stay Secure On The Cloud: 3 Things You Need To Know

Cloud computing is an amazing advance in technology. Where before, whole servers would have to be dedicated on site to things like accounting software or email clients, now, much of those services are cloud-based, making it cheaper and easier to implement company-wide programs. But what about cloud data security? What does the cloud mean for …

Stay Secure On The Cloud: 3 Things You Need To Know Read More »

SIEM, SOC, and YOU!

There are a lot of products and brands out there that like to talk about cybersecurity. SIEM. SOC. Antivirus. “Network Monitoring.” Some of these solutions are effective. Some are not. But here’s one thing they all have in common: implemented alone, without the appropriate knowledge and context of your organization’s security needs… they will ultimately …

SIEM, SOC, and YOU! Read More »

Scroll to Top