7 Ways to Respond to Network Threats

With the re-awakening of ransomware attacks that plagued many networks last year, cybersecurity is arguably at the top of every network administrator's priority list. With that being said, here are 7 ways to respond to network threats. 1. Network Segmentation In specific circumstances, network segmentation, which is a process by which we separate parts of... Continue Reading →

PenTest Edition: Kismet Wireless

Kismet is a type of passive 802.11 (wireless) data-link layer packet sniffer and network detector. As long as you possess a network adapter that supports Monitor mode, you can sniff and identify 802.11a/b/g/n networks. Kismet is available for Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. Although you can download and install it on a Windows... Continue Reading →

Secure Software Development Practices

The software applications we utilize are absolutely productive and wonderful tools to have, but they're also used as attack vectors to gain a leverage inside the organization that use these applications. That's why it's important that we secure the development of software from start to finish. Historically, the software development team and the quality assurance... Continue Reading →

Intrusion Detection and Prevention Systems

The process of intrusion detection involves the monitoring of systems or networks for any signs and occurrences of events or incidents deemed either suspicious or in violation of to an organization's security policy or rule set. An "Intrusion Detection System (IDS)" is a hardware appliance or software that has the ability to detect signs of... Continue Reading →

Common Endpoint Vulnerabilities and Their Proper Remediation

Endpoints are end-user devices (think mobile, desktop, peripherals, or otherwise). Mobile smartphones, especially, are common attack vectors. Here, I'll discuss the more predominant vulnerabilities facing our endpoints and what we can do to prevent and mitigate these problems. Malicious E-Mail Attachments Malicious e-mail attachments are always concerning because many employees click on them and end... Continue Reading →

Tips for Securing Your Network

Before I begin, let's address two obvious questions. Number one, what kind of network are we talking about here? I'm referring to a large or enterprise network. However, you can implement some of these security solutions on your home or SOHO network. Well, maybe you wouldn't want a network access enterprise server at your home.... Continue Reading →

The Ping of Death

The "Ping of Death" abuses the "Internet Control Message Protocol," which we rely on for troubleshooting and reporting utilities on our network, such as the "Ping" command. Network folks usually "ping" another host or system, either on the local network or on the Internet, to test its reachability. For example, you could ping a Web... Continue Reading →

WordPress.com.

Up ↑