What measures might be taken to make a hacker's work as difficult as possible? We suggest a fundamental change has come about – where ten years ago [...]
About Cam OwenThis author has not yet filled in any details.
So far Cam Owen has created 6 blog entries.
What is a Man-in-the-Middle Attack, is it relevant, and how do I protect my network. A Man-in-the-Middle (MiTM) attack amounts to inserting the computer of an attacker [...]
Today's cyber-criminal may be trained in business, not hacking! Today's cyber-criminal may not be a skilled hacker, but rather a person skilled with business processes, perhaps at [...]
Credentials harvesting should not unlock your network! A hacker / cyber-criminal, having gained access to a system network, will begin to explore that network, looking to identify [...]
Going to the cloud must be cheaper than an onsite server! Right?? For many years small business has budgeted for upgrade of the company server every five [...]