Network Security is a “Whole Field” Game
Network security requires a good firewall, detection system and containment. Firewall, Detection, Containment. It does not help that each of these three disciplines is complicated, technical, and protecting from a diverse array of threats. They can also [...]
Preparing for the Network Hacker
What measures might be taken to make a hacker's work as difficult as possible? We suggest a fundamental change has come about – where ten years ago companies could reasonably strive to prevent a successful network attack [...]
Man-in-the-Middle (MiTM) Attacks
What is a Man-in-the-Middle Attack, is it relevant, and how do I protect my network. A Man-in-the-Middle (MiTM) attack amounts to inserting the computer of an attacker (the MiTM computer) within the network path of a targeted [...]
Who is the Cyber-Criminal?
Today's cyber-criminal may be trained in business, not hacking! Today's cyber-criminal may not be a skilled hacker, but rather a person skilled with business processes, perhaps at an executive level. All of the tools required for discovering [...]
TLP – Tiered Logon Protocol
Credentials harvesting should not unlock your network! A hacker / cyber-criminal, having gained access to a system network, will begin to explore that network, looking to identify resources and acquire privileges to gain access. A good place [...]
On-Premises Server
In these uncertain times, I like having my own server Much is being said today about the merits of cloud hosted services – but I like having the core information required to operate my company located [...]
Cloud Services for the Small Business
Going to the cloud must be cheaper than an onsite server! Right?? For many years small business has budgeted for upgrade of the company server every five years or so. And yet, for several years now CTP [...]