Internet of Things (IoT)

The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT is essentially any …

May 12th, 2020

MAZE Ransomware: 3x Threat to Data Security

MAZE Ransomware represents a change for the worse in the capabilities of online hackers today. Traditional backup strategies are no longer enough to provide a get-out-of-jail-free card when hit with ransomware. Data confidentiality is also at risk now and that changes who will pay ransoms dramatically. Prepare now to avoid this scourge of online hacking.

April 28th, 2020

Attacks on Mobile Devices Increasing

In 2020, the number of daily smartphone users in the world totals 3.5 Billion or 45% of the world’s population. However, the total number of people who own a smart or …

April 7th, 2020

Gateway

A Gateway is a hardware device that sits between two networks, acting as a “gate”. An example of a gateway is a router, firewall, server, or anything that allows traffic …

March 31st, 2020

Dwell Time

Dwell Time is the amount of time threat actors go undetected in an environment. In other words, when a hacker intrudes into your network or systems, the dwell time is …

March 19th, 2020

Web Application Firewall (WAF)

A Web Application Firewall (WAF) is used to protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks …

March 5th, 2020

Drive-By Download

A Drive-By Download is the unintentional download of malicious code to your computer or mobile device that may compromise your computer leaving you open to further attack by hackers. Many …

March 2nd, 2020

Wired Equivalent Privacy (WEP)

A Wired Equivalent Privacy (WEP) is a deprecated wireless security protocol that was designed to provide a wireless local area network (WLAN) with a high level of security and privacy …

February 27th, 2020

Media Access Control (MAC) Address

A Media Access Control (MAC) Address is a hardware identification number that is uniquely assigned to each device on a network. The MAC address is manufactured into every network card, …

February 24th, 2020

Lightweight Directory Access Protocol (LDAP)

A Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. The networks …

February 24th, 2020

Honeypot

A Honeypot in cybersecurity refers to a strategy used to catch cyber criminals in the act of trying to exploit a vulnerability and compromise a company. A honeypot can be …

February 21st, 2020

Network Based Intrusion Detection System (NIDS)

A Network Based Intrusion Detection System (NIDS), or Network Based IDS, is security hardware that is placed strategically to monitor critical network traffic. Traditional Network Based IDS analyzes passing network …

February 12th, 2020

Backdoor

A Backdoor in the world of cybersecurity refers to the strategy used to get around normal security measures and gain privileged user access on a computer system, network, or software …

February 12th, 2020

Demilitarized Zone (DMZ)

The Demilitarized Zone (DMZ) is sometimes referred to as a “perimeter network”, its primary purpose is to add an additional layer of security for the organization’s LAN (Local Area Network). …

January 8th, 2020

Trusted Wi-Fi Network

Trusted Wi-Fi Network refers to a network that is password protected and often is AD (active directory) authenticated via RADIUS. A network that is AD authenticated will have you enter …

January 8th, 2020

Computer Network Defense

Computer Network Defense is the actions taken to defend against unauthorized activity within computer networks. Some examples of network defenses are firewalls, demilitarized zones (DMZs), Virtual Private Networks (VPNs), and …

December 26th, 2019

Physical Security Awareness Training for Employees

Network Services

Network ServicesĀ in cybersecurity work is where a person installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, …

December 26th, 2019

Network Resilience

Network Resilience is the ability of a network to: (1) provide continuous operation (i.e., highly resistant to disruption and able to operate in a degraded mode if damaged); (2) recover …

December 26th, 2019