Network security requires a good firewall, detection system and containment. Firewall, Detection, Containment. It does not help that each of these three disciplines is complicated, technical, and [...]
About Cam OwenThis author has not yet filled in any details.
So far Cam Owen has created 7 blog entries.
What is a Man-in-the-Middle Attack, is it relevant, and how do I protect my network. A Man-in-the-Middle (MiTM) attack amounts to inserting the computer of an attacker [...]
Today's cyber-criminal may be trained in business, not hacking! Today's cyber-criminal may not be a skilled hacker, but rather a person skilled with business processes, perhaps at [...]
Credentials harvesting should not unlock your network! A hacker / cyber-criminal, having gained access to a system network, will begin to explore that network, looking to identify [...]
Going to the cloud must be cheaper than an onsite server! Right?? For many years small business has budgeted for upgrade of the company server every five [...]