Cyber Security Insight

A DDoS attack can wreck immediate havoc on your business's network if it is ill-prepared to fight back. Unfortunately, DDoS, or distributed denial of service, attacks are being used against websites via CCTV DVRs and cameras, according to a recent report. The research firm Sucuri saw the...

A wireless network is a ubiquitous commodity to any organization. In that case, it should go without saying that security measures are up to speed with the latest wireless tools. If only that were the case. Close to 50% of IT leaders say their wireless components embody the...

Advanced Persistent Threats (APTs) seem to be all the rage within cyber crime circles. Defined as an unwelcome user gaining access and planting footholds within the network for an extended period of time to steal information, it seems APTs have even hit the political circuit. The DNC released...

Recently we outlined the different types of IDS options available for businesses looking to beef up their cyber security protection. In this post, we're going to dive into Intrusion Prevention Systems, or IPS, and focus on how it prevents malicious attacks from occurring within your network. Picking...

There are a lot of acronyms and abbreviations in the cyber security world - too many, it seems. Whether you're new to the industry or a seasoned veteran, it's always good to be aware of the major players in this acronym game, especially since they...

The Federal Financial Institutions Examination Council, or FFIEC, is warning banks across the country and around the world about the threats posed by hackers to their networks. Specific to the Lazarus Group but also serving as an umbrella warning, the FFIEC is opening the lines of communication...

Picking up from the previous post, Kevin Roose of Fusion experienced the effects of pentesting on his own network in order to pinpoint vulnerabilities. After going through the rigorous process of having two equally skilled cyber security professionals hack into his network and disrupt it as much as...

PenTesting, or Penetration Testing, is the next big thing in the pursuit of impenetrable cyber security protection. Ironically, it involves a company's network being maliciously attacked by "hackers" - aka a hired cyber security company - in order to discover vulnerable endpoints. Kevin Roose, a writer at Fusion,...

In a rare turn of events, the creators of the ransomware TeslaCrypt actually turned over the very key that unlocks their malicious program. An analyst at ESET happened to notice that TeslaCrypt was slowly shutting down over the past few weeks. On a whim, he requested that...