Recently, I have seen a wave of emails that contain attachments with malware and spyware. The email is directed to me and it looks like a legitimate business email. For example, if your business does not do ACH payments, then you will not receive an email detailing issues about it. Think before you click.
With passwords being easily cracked, it might be time to look at two-factor authentication for important web facing systems. With two-factor authentication a compromised password becomes ineffective. This is an easy way to better protect your web facing system.
To get away from a single password that is shared with everyone, you should start using radius on your networking devices. This allows you to audit access by user accounts and also gives you the ability to audit changes. You can also setup a read-only group for users who only need read-only access. This allows […]
With shellshock and heartbleed threats, you might have some vulnerable security devices. You should update switches, routers, firewalls and security appliances such as RSA and SSL VPN devices. This is something you should be doing at least once, if not twice a year.
With the cryptowall and cryptoblocker virus running wild, I have had a few clients be affected by this. The easy answer is to block executables from being downloaded. This will prevent users from downloading them and infecting your network. Most modern firewalls can help with this task.
A vulnerability scan can help identify what vulnerabilities exist on your network. It is wise to run a vulnerability scan at least once a year to help identify what potential vulnerabilities exist and to then patch them. A hacker/attacker of your network will be using a similar tool, if not one of the first tools they […]
What is EXIF? It stands for “exchangeable image file format” and it contains information such as shutter speed, ISO speed, and various other information (including, if the device has a GPS, the location of the photo). If you are posting this information to the internet, you could be uploading this information with the picture. For […]
[anchor name=”compromised”] Most Organizations Have Been Compromised and Don’t Even Know It According to the Cisco 2014 Annual Security Report most businesses have been compromised and they don’t even realize it. In this report, 100% of business networks that Cisco analyzed had traffic going to websites that host malware. Attacks are also taking much longer […]
Firewalls have had some major advancements in the last 3-5 years. If you are running an older firewall, it is time you look at an upgrade. Most modern firewalls can scan your traffic for viruses and threats. It can also have URL filtering built right into the device to help keep good employees from going […]
I have posted this tip before and I am going to post it again: You should really be looking at your router, network switches and firewalls to see if they need a firmware or code upgrade. These devices typically just run and people forget that they need attention from time to time. I would suggest […]