paykasa bozdurma
Home > Support > Blog
Tip and Tricks for Enhancing IoT Security

Tip and Tricks for Enhancing IoT Security

The Internet of Things (IoT) is expanding rapidly — as are the security and privacy risks associated with it. One recent study suggests that nearly 20 percent of organizations have already suffered distributed denial of service (DDoS) attacks by IoT botnets. Gartner analysts say security concerns are inhibiting growth of the IoT.

Wednesday, September 19, 2018/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (40)/Comments (0)/
Categories: Security Services
3 Key Takeaways from the VPNFilter Threat

3 Key Takeaways from the VPNFilter Threat

In late May, malware known as VPNFilter began targeting routers from Linksys, Mikrotik, Netgear, QNAP and TP-Link, as well as network-attached storage (NAS) devices from QNAP. The malware operates in three stages. First, it is installed and maintains a persistent presence on the device so it can contact a command-and-control (C&C) server to download additional modules. 

Monday, June 25, 2018/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (182)/Comments (0)/
Categories: Security Services
How to Use a Password Manager to Implement Good Password Practices

How to Use a Password Manager to Implement Good Password Practices

We’ve previously discussed what not to do when constructing passwords. I put a stake in the ground at 14 printable ASCII characters for offline systems and 20 for systems accessible over the internet. (Remember that those are minimum numbers. I tend to default to 32 characters whenever possible). Couple this with a “no repeat” recommendation and most people’s brains are about to explode! 

Monday, June 11, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (186)/Comments (0)/
Categories: Security Services
Tags:
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (393)/Comments (0)/
Categories: Security Services
A Security Expert Explains the Top Password Pitfalls

A Security Expert Explains the Top Password Pitfalls

Typically, when I speak to someone about passwords and how to improve them, the follow-up question to the instructional “do this” is inevitably “why?” So we’re going to start with “why certain passwords are bad” and then follow up in a few weeks with “what should we do about that?” This post will attempt to show you the pitfalls many passwords fall into, broken down into four main categories.

Tuesday, April 24, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (457)/Comments (0)/
Categories: Security Services
RSS
12345678910 Last