Free Security Assessment

Submit

Blog

Deploying Mobile Devices Securely – Part 2

Introduction In this blog, we continue our series on how to secure wireless devices at your place of business. How to Secure Mobile Devices in Your Environment 1)  Always test your mobile security policy and threat landscape before implementing it: Before you start to implement and enforce your policies, it is always important to evaluate them first in a ...

Read More

How to Recover from A Phishing Attack – Part 1

Introduction Our last series of blogs closely examined the details of a Spear Phishing Attack. But whoever or whatever the target is, once the damage is done, efforts need to be taken to mitigate the damage, and try to find ways so that these types of attacks don’t happen again. In this series of blogs, we examine ...

Read More

KAMIND IT Features Article with Portland Business Journal

On September 6th, 2019 KAMIND IT published an article with Portland Business Journal titled “Steps to take if your company’s data has been breached” This article was written by KAMIND IT’s CEO Matthew Katzer and Creative Director Jack Biehn, and covers what necessary steps Organizations should take when facing a cybersecurity breach. Click on the ...

Read More

What Advanced Threat Protection Is

Introduction When looking at Cyberattacks that occurred over the last few years, while quite devastating, the good news (if you can call it that) was that they could be detected and mitigated. Once this happened, whatever pieces of evidence still remained could then be collected, and studied by a Forensics Investigations team in order to conduct ...

Read More

What Do Email Phishing Scams Do? Best Practices for Protecting Your Information

Email Phishing scams are carried out online by tech-savvy con artists and identity theft criminals. They use spam, fake websites constructed to look identical to real sites, email and instant messages to trick you into divulging sensitive information, like bank account passwords and credit card numbers. Once you take the phisher's bait, they can use ...

Read More

Deploying Mobile Devices Securely – Part 1

Introduction As we all know, mobile devices have become not an integral part of the workplace, but even in society. Therefore, the safe deployment of these devices is of paramount importance not just for individuals, but businesses and corporations, government agencies, as well as other entities. For example: Mobile devices have indeed become an integral part of ...

Read More

Portland Public Schools nearly scammed out of $2.9 million

Portland Public Schools was bilked for $2.9 million when a fraudster posing as one of the district’s construction contractors hoodwinked employees into green lighting the payment, district officials say. The swindle was caught while the millions were still in the fraudster’s bank account, and the money should be returned to the district’s Wells Fargo account in ...

Read More

The Internet Control Message Protocol (ICMP) – Part 1

Introduction There are many security tools (such as those of Firewalls, Network Intrusion Devices, Routers, etc.) out there that can alert a Network Administrator of any penetrations that are occurring.  But these devices, for the most part, can only detect those Cyberthreats that are coming from the external environment. In addition to this, what is also needed ...

Read More

The Next Behavioral Biometric – Signature Recognition

Overview When compared to the Physical-based Biometrics, there are only two Behavioral based Biometric modalities. The last article covered a technology which has been around for quite a long time, which is that of Keystroke Recognition. In fact, it even dates all the way back to when the Morse Code first came out. From the various signals ...

Read More

Breaking Down What A SIEM Is & Its Benefits

Introduction In dealing with today’s Cybersecurity threat landscape, businesses and corporations have deployed many tools from different vendors to beef up their lines of defense.  The thinking here is that more is better, but this is only increasing the attack surface for the Cyberattacker.  There is now a fundamental shift in this kind of thinking, and ...

Read More