Preparing for the Network Hacker
Cam Owen2020-11-23T13:53:25+00:00What measures might be taken to make a hacker's work as difficult as possible? We suggest a fundamental change has come about – where ten years ago [...]
What measures might be taken to make a hacker's work as difficult as possible? We suggest a fundamental change has come about – where ten years ago [...]
What is a Man-in-the-Middle Attack, is it relevant, and how do I protect my network. A Man-in-the-Middle (MiTM) attack amounts to inserting the computer of an attacker [...]
Today's cyber-criminal may be trained in business, not hacking! Today's cyber-criminal may not be a skilled hacker, but rather a person skilled with business processes, perhaps at [...]
Credentials harvesting should not unlock your network! A hacker / cyber-criminal, having gained access to a system network, will begin to explore that network, looking to identify [...]
Collaborative Technology Partners, Inc., is a Boston MA based provider of Cloud Services, MSP and Cyber Security Consulting for companies operating in a Microsoft environment.