New Netwrix Auditor 9.7: Detect and Block Attacks on Your Network Devices Explore Now
5 September, 2018 | Jeff Melnick

What Is Privilege Escalation?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
21 June, 2018 | Ryan Brooks

SysAdmin Magazine: Confessions of a Hacker

Hackers are always lurking nearby, ready to exploit any mistake you make in order to infiltrate your network. Stay one step ahead! Learn how they think, act and hide their nasty moves in the June edition of SysAdmin magazine. 4 Steps You Should Take If You Have Been Hacked A data breach...
15 May, 2018 | Jeff Melnick

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the 10 most common cyber attack...
20 September, 2017 | Cassie Phillips

4 Steps You Should Take If You Have Been Hacked

A data breach can be a disastrous scenario for a small or medium-size business, and even the largest of corporations can be set back months or spend millions recovering from a hack. Minimizing risk and preventing network hacking from happening in the first place should be one of any company’s top...
23 August, 2016 | Jeff Melnick

7 Ransomware Myths Busted

Of today’s cyber security threats, ransomware is a modern scourge. Even though it has made a number of headlines in the past couple of years, ransomware is still surrounded by myths. Dispelling those myths is one of the key factors of developing an effective information security strategy. Here...
Show more articles