What is Zero Trust – Zero Assumptions? Zero Trust – Zero Assumptions is a security strategy and framework that requires everyone – users and devices – to verify their identity before [...]
A Managed Service Provider’s (MSP) and Cloud Service Provider’s (CSP) goals at a high level are quite simple. While MSP’s and CSP’s perform a wide array of tasks, they can all be funneled into [...]
As a kid, I remember my parents proving me with sound and prudent life advice all the time. I know I listened to most of it. I’m sure other great information went in one ear and out the other. [...]
What is a DNS Leak? A Domain Name System (DNS) leak is a security flaw that takes place when your DNS requests are involuntarily sent to a non-specified DNS server in lieu of the one you [...]
Last year cyber attacks rose sharply, targeting healthcare, infrastructure, financial establishments as well as political campaigns. And there appears to be no end in sight. The sophistication of [...]
Microsoft released a Cyber Security Awareness Guide, Becoming Cybersmart, to help organizations understand what they can do to help keep themselves and their employees safe online. The guide is [...]
What Is A Zero Day Vulnerability? A zero day vulnerability is a software or hardware flaw that is unknown to those who should be interested in mitigating the vulnerability, including the [...]
What are Social Engineering Attacks? Social engineering attacks are manipulative tactics used by threat actors to trick individuals into divulging confidential information or performing actions [...]
What is RAT? A Remote Access Trojan (RAT) is a type of malware that allows a threat actor to gain unauthorized access and control over your computer. Additionally, RATs provide the threat actor [...]
The Dark Web works by deploying specialized tools and protocols that enable users access to intended websites to conduct transactional activities anonymously. The Dark Web is a subset of the Deep [...]