Go Ahead and Hack Us!
That is the message companies have according to the Christian Science Monitor survey “Conventional wisdom” and results of the survey are at odds, there is an overall thinking that all…
Your Cyberdefense Still 2000’s Thinking?
Yes it is February 20, 2015 And it is high time you replaced your firewall(FW), just like all computers the new firewalls have better processors and chips to make your…
Hiring a Hacker for Evil
It seems it is not so hard to hire a hacker for evil. Several articles discuss the how and why: http://bgr.com/2015/01/16/how-to-hire-a-hacker/ There is even a website that apparently had so…
Cyberattacks too difficult – I give up
Massive cyberattacks, difficult configurations? what to do from here? All I have is some unusable data to the hackers – what is important about our stuff. We are inundated with…
2 Steps Stop All Cyberattacks
1. Obtain a technology that will be able to see the attacker trying to communicate with the attack software(malware etc) in your network. This system should have the capability to…
