Network Security

Four Fundamental Network Security Tips But Often Ignored

We cannot make someone reads our article to become a CCNA-level network administrator anytime soon. Networking is hard, with various protocols, wiring standards and other critical parts that need to work hand-in-hand to even enable a transfer of PING packets. Take a look at the basics of the seven layers of the OSI model, to

[ Read More ]

Fundamentals Of A DDoS Attack

Distributed Denial of Service Attack (DDoS) is a critical cybersecurity concern that causes a service to stop by sending numerous processing requests from multiple computers to a target server over the network. DDoS basically is an expansion of the DoS attack, when multiple computers make simultaneously request service from a certain target in an effort

[ Read More ]

Safely Dealing With Network Security In The Age of BYOD

The introduction of telework that allows people to work from outside the office using PCs and smartphones is also in progress. If telecommuting spreads, employees will be able to spend time commuting to work. In addition, you can flexibly work according to personal circumstances, such as being able to work while raising children and taking

[ Read More ]

Paterson Public Schools In Deep Trouble After A Massive Data Breach

Aside from the Healthcare Industry that focuses its funding towards its hospital services to the patients, public schools also do the same – the focus is their interest in educating young people. The idea of having a cyber attack-ready computing infrastructure is not even on the radar, as it is not part of the funding

[ Read More ]

From FBI Executive To White House CIO, A Security Expert Speaks Out

“We are caught in an inescapable network of mutuality…” These words were written by Martin Luther King Jr. from his jail cell in Birmingham, Alabama. Although he was referring to our mutual dependency as people, he could just have easily been writing about the internet. Of course, the internet did not exist back in 1963—but

[ Read More ]

Hackers Now Use Their Own Admin Tools Against Company Networks

As if the threatscape couldn’t hold any more danger, IT teams must now add their favorite network administration tools as possible backdoor entry points for hackers. Hackers have found a way to abuse LDAP, Kerberos, and NTLM, take over WMI and DCE/RPC, two popular network admin tools, to get admin privileges. After an initial infection

[ Read More ]