Since our business is focused on Security, we talk a lot about the threat landscape. Many attacks are focusing on password stealing. Once an attacker has legitimate credentials the attack surface widens greatly. Protect Your Passwords To avoid this, we have several...
Emotet may sound like an ancient Egyptian pharaoh, but it’s actually something much more current. It’s a banking Trojan that has been wreaking havoc and stealing banking information from individuals and businesses since 2014. Emotet has evolved since its inception and...
When you think of island hopping, you may think of a Caribbean vacation, but when it comes to the security of your network, “island hopping” is far less relaxing. Island hopping is the new trend in cyber-attacks where attackers gain access to not just your network,...
The topic of the day in security as of late has been Endpoint Detection and Response (EDR). The buzz has created a lot of conversations with our clients about Threat Hunting, Threat Remediation and Indicators of Compromise. The challenge for many of our clients is...
Vulnerability scanning, the inspection of the network to detect any potential areas prone to exploit, is an essential part of a strong security posture. But how do you know if the type of scans you’re running, or the frequency of the scans is enough to protect your...