Cyber Security Consulting

Preparing for the Network Hacker

2020-11-23T13:53:25+00:00

What measures might be taken to make a hacker's work as difficult as possible? We suggest a fundamental change has come about – where ten years ago [...]

Preparing for the Network Hacker2020-11-23T13:53:25+00:00
  • Man-in-the-Middle (MiTM) Attacks

Man-in-the-Middle (MiTM) Attacks

2020-07-30T19:10:53+00:00

What is a Man-in-the-Middle Attack, is it relevant, and how do I protect my network. A Man-in-the-Middle (MiTM) attack amounts to inserting the computer of an attacker [...]

Man-in-the-Middle (MiTM) Attacks2020-07-30T19:10:53+00:00

Who is the Cyber-Criminal?

2020-11-20T15:34:49+00:00

Today's cyber-criminal may be trained in business, not hacking! Today's cyber-criminal may not be a skilled hacker, but rather a person skilled with business processes, perhaps at [...]

Who is the Cyber-Criminal?2020-11-20T15:34:49+00:00
  • Tiered Logon Protocol

TLP – Tiered Logon Protocol

2020-11-20T15:35:35+00:00

Credentials harvesting should not unlock your network! A hacker / cyber-criminal, having gained access to a system network, will begin to explore that network, looking to identify [...]

TLP – Tiered Logon Protocol2020-11-20T15:35:35+00:00

Collaborative Technology Partners

Collaborative Technology Partners, Inc., is a Boston MA based provider of Cloud Services, MSP and Cyber Security Consulting for companies operating in a Microsoft environment.

Cyber Security Consulting Services

CONTACT US

Go to Top