The Internet Control Message Protocol (ICMP) – Part 1

Introduction There are many security tools (such as those of Firewalls, Network Intrusion Devices, Routers, etc.) out there that can alert a Network Administrator of any penetrations that are occurring.  But these devices, for the most part, can only detect those Cyberthreats that are coming from the external environment. In addition to this, what is also needed ...

Read More

The Next Behavioral Biometric – Signature Recognition

Overview When compared to the Physical-based Biometrics, there are only two Behavioral based Biometric modalities. The last article covered a technology which has been around for quite a long time, which is that of Keystroke Recognition. In fact, it even dates all the way back to when the Morse Code first came out. From the various signals ...

Read More

Breaking Down What A SIEM Is & Its Benefits

Introduction In dealing with today’s Cybersecurity threat landscape, businesses and corporations have deployed many tools from different vendors to beef up their lines of defense.  The thinking here is that more is better, but this is only increasing the attack surface for the Cyberattacker.  There is now a fundamental shift in this kind of thinking, and ...

Read More

Road To Gold

The road to the Junior Olympics is not one paved with gold! Our Co-Workers son Isaac Campbell is a superb Water Polo player and an already established medal-winning swimmer. Assist this young champion in becoming the next athlete to don the cover of a Wheaties Box! $1,800.00 is the goal, please give what you can.Click ...

Read More

The Top 5 Pentesting Tools You Will Ever Need

Introduction There is no doubt today that the threat landscape is changing on a daily basis. It seems like that hardly one threat is discovered that many unknown ones are still lurking. One of the best ways for businesses and corporations to defend themselves is through Penetration (Pen) Testing. This article will provide an overview of ...

Read More

Never Use Airport USB Charging Ports – Or Cords Laying Around

This Forbes article details how hackers are targeting travelers using public USB charging stations. In addition, never use a charging cord or random USB storage device you may find laying around – chips hidden inside can hack your computer and steal your data. This intel courtesy of X-Force Threat Intelligence at IBM Security and via ...

Read More

CISA Statement on Iranian Cybersecurity Threats

WASHINGTON – In response to reports of an increase in cybersecurity threats, the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs issued the following statement: “CISA is aware of a recent rise in malicious cyber activity directed at United States industries and government agencies by Iranian regime actors and ...

Read More

LinkedIn tips for Small Businesses

As a small business owner, you may be a bit perplexed how to gain the most value out of LinkedIn. You may have already spent countless hours trying to leverage the platform with little success. So what are you doing wrong? And how can you make the ...

Read More

Secure your business with these IT policies

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, and this is why employee mistakes are one of the most common causes of a security breach. So what can you do to prevent it? Well at the very least ...

Read More

Business Continuity tactics to keep your business running

It’s a fact of life. Events out of your control can disrupt your business operations. While you can’t necessarily control the unexpected, you can take some precautions to prevent most business disruptions. Here are some key business continuity strategies that organizations across the globe rely on to ...

Read More