Blog

Cyber Insurance Explained

There is a new trend that is emerging – that of Cybersecurity Insurance. Because of what it all has been through, the City of Baltimore has purchased a sweeping, brand new $20 million policy in order to protect not only its assets, but the people whom have been impacted by it as well, which includes mostly ...

Read More

How Are Penetration Teams Structured – Part 3

What Is the Red Team? The Red Team that has the primary responsibility of launching an “ethical based” Cyber-attack against the defense perimeters of a business or a corporation in order to uncover its true Security vulnerabilities, weaknesses, and holes.  But it is important to note here that the Red Team is not particularly interested in ...

Read More

An Introduction to Spear Phishing – Part 3

Incidents of Spear Phishing As we have reviewed, Spear Phishing, is quite different than the normal Phishing attack.  In these cases, the Cyber attacker just merely launches an all-out attack, in the hopes of being able to harvest sensitive information and data.  In these cases, typically, a hijacked e-mail address book (or even many of them) ...

Read More

An Introduction to Spear Phishing – Part 2

What the Spear Phisher is After Our last blog examined what a Spear Phishing attack is.  In today’s blog, we examine what the primary targets are: 1. Money, Money, Money and lots of it: While other Phishing based campaigns focus on getting any kind of personal information and data, the Cyber attacker in this case, wants just one ...

Read More

An Introduction to Spear Phishing – Part 1

Introduction to Spear Phishing As we know it today, Phishing has become one of the most commonly used tactics by the Cyber attacker in order to garner personal information and data.  This primarily involves our physical addresses, E-Mail addresses, credit card numbers, banking and other types and kinds of financial information, Social Security numbers, etc. Phishing involves ...

Read More

Don’t Be Common

Many of us spend a good majority of our lives at our place of work, with people that we can sometimes tolerate or even on a rare occasion, enjoy. So if we are spending this vast amount of time with these individuals wouldn’t it be nice to have some sort of connection or otherwise common ...

Read More

An Introduction to Mobile Device Management

As a business owner, you have many responsibilities and activities that you have to deal with on a daily basis.  One of these tasks is overseeing the management of your IT Infrastructure.  You may already have an administrator doing these day to day functions, but you want to make sure that you know what is ...

Read More

How Are Penetration Teams Structured – Part 2

What Is the Blue Team? The overall, arching task of the Blue Team is fight off the Cyber-attack that has been launched by the Red Team.  But apart from this, the Blue Team has other specific responsibilities in the efforts to overcome the Cyber-attack.  They are as follows: Preparedness: The Blue Team will do everything possible in ...

Read More

How Are Penetration Teams Structured – Part 1

Introduction In the world of Cyber Security today, there are obviously many technologies out there that one can use fortify the lines of defense for their business or corporation.  To a certain degree, depending upon how well these devices have been deployed and implemented, they should block any malicious traffic coming in into your IT Infrastructure ...

Read More

Encrypted DNS – It’s coming (it’s here)!

Plain Old Unencrypted DNS Most of the readers of this blog will already be familiar with DNS systems and how they work but let me just refresh your memory.  And for readers who are unfamiliar with DNS, this will give you a very brief overview of DNS and what it does. DNS stands for Domain Name System, ...

Read More