Modern security is a myth

The trillion dollar myth of Endpoint Security

Thus far in our series we have reviewed a sophisticated ransomware utilizing stealth and lateral movement techniques, an infamous case of wiperware masquerading as ransomware spread by hacked nation-state tools and an ever-changing swiss army knife which exists as a tool run by one criminal organization offering services to many.   Today, in 2019, the[…]

scary kitty

Let’s dish about that ugly, nasty Scranos

No, not that guy! *Scranos*.     Scranos, the data-stealing malware which, according to ZDnet in an article dated June 13, 2019 claims, “…has returned with new attacks and nasty upgraded features”. It’s not quite as scary as a being capable of erasing half the population of earth, but you would not know that when reading[…]

Prevention STILL Beats Detection in Cybersecurity

The concept of Prevention before Detection is very easy to understand in most industries, except cybersecurity. Breach after breach in today’s news give us plenty of examples of cybersecurity professionals depending too much on Detection, and not enough on Prevention. But is that what you the business owner or consumer expect? I’m sure there are a[…]

DDoS Attacks – Making Sense Of It

Cybersecurity has certainly had an interesting few days with the massive DDoS attacks across the USA. The cause, the method, and the massive reach of this DDoS attack truly underscores another dimension of the importance of cybersecurity: making sure your network is not participating in an attack like this. Breaking down the DDoS attack to[…]

Malware Prevention vs Antivirus

Malware Prevention vs Antivirus

Understanding malware prevention, what you have and what is available to protect your computer network and data is essential. Otherwise you will be spending a lot of money on antivirus products that don’t do what you expected. Could also very likely spend a lot more money recovering from a breach (i.e. fines, lost time, lost[…]

Cyber-Security

Cyber Security – Information Security

Protect ourselves with cyber security is fundamental. In our organization, personal life, as well as in our schools. “Cyber security practitioners, perform job functions related to protecting and defending information systems. This is done by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.” CyberSec First Responders Certification Benjamin Franklin; “An ounce of prevention is worth a pound[…]

Application control, ransomware, computer security

Application Control – Prevent Ransomware

Begin protecting your computer today by using advanced application control. Given the volume of unknown malware, new variants, zero-day exploits, and hackers that are stealing and/or posting your data online, what good is any software that cannot stop the hack?  The second your data is stolen, you’re done!  There is no remediation.  Except to pay fines and eat the[…]