Blog

Encrypted DNS – It’s coming (it’s here)!

Plain Old Unencrypted DNS Most of the readers of this blog will already be familiar with DNS systems and how they work but let me just refresh your memory.  And for readers who are unfamiliar with DNS, this will give you a very brief overview of DNS and what it does. DNS stands for Domain Name System, ...

Read More

An Introduction To Penetration Testing – Part 3

Introduction Our last blog examined what the Red Team does in a Penetration Testing exercise.  This team is often viewed as the “bad guys” because they are trying to act like a Cyber attacker in order to break down your lines of defenses. In this blog, we examine the “good guys” – the Blue Team. This the ...

Read More

The 5 Most Successful Work Environments (and the 5 Worst)

There are hundreds of different work-environment characteristics: Some can be easily measured and quantified -- examples being the amount of office space available and the color of the walls. And some are more qualitative -- such as general feelings of malaise or enthusiasm that may be rippling through employees. Like any organizational leader, you want ...

Read More

An Overview Into Tech Support Scams

Introduction The world of business has never been as connected as it is now. Today, all of our servers, computers, workstations, wireless devices (especially our Smartphones) and just about everything else interacts with one another in a seamless fashion, for the most part. This degree of interconnectedness is only going to further expand exponentially into the future ...

Read More

What Machine Learning Is All About

Introduction Daily, we keep hearing about the number of Cyberattacks that are taking place. In fact, every day, major news headlines report a business or a corporation being hit with thousands, or even millions of Personal Identifiable Information (PII) records being maliciously hijacked. Although Cyberattacks very often occur in mere minutes, if not seconds, the aftermath that ...

Read More

How to Recover from A Phishing Attack – Part 2

Introduction Our last blog examined the steps that you need to take in order to recover from a Phishing attack. In this one, we can continue with that theme. The Steps Remediation: This is deemed to be one of the most critical phases; as this is where the damage of the Phishing attack will be contained. This ...

Read More

Thousands of Google Calendars Are Leaking Private Information Online

"Warning — Making your calendar public will make all events visible to the world, including via Google search. Are you sure?" Remember this security warning? No? If you have ever shared your Google Calendars, or maybe inadvertently, with someone that should not be publicly accessible anymore, you should immediately go back to your Google settings and check ...

Read More

Deploying Mobile Devices Securely – Part 2

Introduction In this blog, we continue our series on how to secure wireless devices at your place of business. How to Secure Mobile Devices in Your Environment 1)  Always test your mobile security policy and threat landscape before implementing it: Before you start to implement and enforce your policies, it is always important to evaluate them first in a ...

Read More

How to Recover from A Phishing Attack – Part 1

Introduction Our last series of blogs closely examined the details of a Spear Phishing Attack. But whoever or whatever the target is, once the damage is done, efforts need to be taken to mitigate the damage, and try to find ways so that these types of attacks don’t happen again. In this series of blogs, we examine ...

Read More

KAMIND IT Features Article with Portland Business Journal

On September 6th, 2019 KAMIND IT published an article with Portland Business Journal titled “Steps to take if your company’s data has been breached” This article was written by KAMIND IT’s CEO Matthew Katzer and Creative Director Jack Biehn, and covers what necessary steps Organizations should take when facing a cybersecurity breach. Click on the ...

Read More