There are many websites online today that promise to create randomly generated passwords for you. These password generators, also known as linear congruential generators, use algorithms to create a random string of letters, numbers and special characters. While...
Recently, it’s come out that there is a flaw in Intel chips that has left millions of computers vulnerable. This flaw allows attackers to steal any data that the Intel processor has recently accessed. The attack, dubbed ZombieLoad, was discovered by Graz University of...
E-mail Security and Office 365 Okay, so you’ve moved to Office365, but did you bring your security with you? Many organizations are under the impression that because Microsoft can stop a few e-mails and tag them as Spam or malicious that it includes e-mail security. ...
Businesses today need to use all of the security tools available to combat threats and stay ahead of hackers. Part of that includes moving to a Zero Trust security model. Rather than operating under the assumption that anything within the firewall should be trusted,...
When you think of island hopping, you may think of a Caribbean vacation, but when it comes to the security of your network, “island hopping” is far less relaxing. Island hopping is the new trend in cyber-attacks where attackers gain access to not just your network,...
The topic of the day in security as of late has been Endpoint Detection and Response (EDR). The buzz has created a lot of conversations with our clients about Threat Hunting, Threat Remediation and Indicators of Compromise. The challenge for many of our clients is...