Vulnerability Management – Just Do It!

Abilities Identify Security issues based on analysis of vulnerabilities – apply cybersecurity and privacy principles to organizational requirements Knowledge Application vulnerabilities, data backup and recovery, host/network access control mechanisms, system administration, network, and operating system hardening techniques. Skills Detecting host and network intrusions Conduct vulnerability scans and recognize vulnerabilities in security systems. Tasks Keep up … Read more

Global Cyberwar: What Does That Look Like?

First we have to discuss – what is a “Global Cyberwar”? It has to do with the current conflict with Russia — Ukraine. In this image(Feb28 and Mar1) there is some interesting information which is from SecurityWeek magazine : The groups and what country they support (Ukraine, UNK (Unknown?), or Russia).  Where they will congregate … Read more

Can Small Businesses get Ransomware?

Unfortunately they can 1. Why Ransomware? because the ransomware attack software is out for everyone – it is easy to send attack emails to millions. 2. Most Attacks start with phishing emails. 3 Have you updated your systems? Also called patched your systems? every month Microsoft and other vendors release fixes to their software which … Read more