Is a Self-Hosted Cloud Solution Right for Your Business

Is a Self-Hosted Cloud Solution Right for Your Business?

Many people think of cloud computing strictly as a solution that involves entrusting third parties to manage their business data, but this is only one aspect of the cloud. When you pay for an Office 365 subscription, for example, you are using a public cloud solution and trusting Microsoft with your data. The Benefits of…

Details
Understanding the Cyber Kill Chain Used by Hackers

Understanding the Cyber Kill Chain Used by Hackers

Information security researchers who study the actions and behavior of sophisticated hackers use the term “cyber kill chain” to describe some of the strategies used in modern cybercrime. To a certain extent, the cyber kill chain is similar to strategies used by military units and career thieves who take pride on pulling off complex heights.…

Details
What You Should Know About the VPNFilter Router Malware

What You Should Know About the VPNFilter Router Malware

According to a recent advisory published by the Federal Bureau of Investigation, small business owners in the High Desert should reboot their routers to minimize their exposure to a new cyber threat. What Businesses Are at Risk for Unsecure Data? The routers affected by VPNFilter include those manufactured by popular brands such as NETGEAR and…

Details
New Wave of Ransomware Attacks Expected

New Wave of Ransomware Attacks Expected

In the world of information security and cybercrime, hackers are known to chase certain trends. In the mid-1990s, cyber vandalism and defacing websites were actions that hackers engaged in for the purpose of making a name for themselves in the underground. Cracking commercial software and distributing pirated copies gained popularity in the early part of…

Details
2018 Will Be The Year of Malware

2018 Will Be The “Year of Malware”

Providing forecasts of the challenges that lie ahead in the information security landscape has become a New Year’s tradition for experts who work in this field. Over the last few years, Israel has become known as a leading nation in terms of cybersecurity research, and one of the most worrisome forecasts was recently issued by…

Details
How Hackers Can Take Down 40 Websites in Minutes

How Hackers Can Take Down 40 Websites in Minutes

Here’s a situation that underscores the importance of network security these days: a novice hacker working for the research and development department of a Japanese automaker was able to exploit a cross-site scripting vulnerability to infiltrate a server and compromise 40 websites in seven minutes. Method of Attack Used in the Hack The attack started…

Details
When Subtitles Attack New Cyber Risk in the High Desert

When Subtitles Attack: New Cyber Risk in the High Desert

If you own a business in Victorville, Apple Valley, Hesperia, or elsewhere in the High Desert, you should know that web browsing by your staff is among the most common causes of virus infections, data breaches, and compromised networks. Firewalls and security software can only do so much to keep business networks safe; to prevent…

Details
Perspective on the WannaCry Ransomware Attacks

Perspective on the WannaCry Ransomware Attacks

In May 2017, the world of information security was rocked by a massive ransomware attack spreading across global networks and impacting critical data infrastructures such as the IT systems of public health departments and mass transportation agencies. Lessons for Local High Desert Businesses There are many aspects of the WannaCry attack that business owners in…

Details
Firewalls The First Step in Information Security

Firewalls: The First Step in Information Security

A couple of plotlines in the biggest movie of the 2016 holiday season were loosely related to network security. A few scenes of Rogue One: A Star Wars Story featured hacking of smart devices, data theft, and even social engineering. Interestingly, one of the main plot points in the film involves a group of rebels…

Details