5 September, 2018 | Jeff Melnick

What Is Privilege Escalation?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
21 June, 2018 | Ryan Brooks

SysAdmin Magazine: Confessions of a Hacker

Hackers are always lurking nearby, ready to exploit any mistake you make in order to infiltrate your network. Stay one step ahead! Learn how they think, act and hide their nasty moves in the June edition of SysAdmin magazine. 4 Steps You Should Take If You Have Been Hacked A data breach...
15 May, 2018 | Jeff Melnick

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the 10 most common cyber attack...
22 June, 2016 | Jeff Melnick

3 Strategies to Avoid Massive Data Breaches

No matter how strong your IT infrastructure security measures are, data breaches do happen. One of the most striking examples of a data breach is the US Air Force breach, which resulted in 100,000  lost investigation records due to file corruption. Unfortunately, neither investigation...
5 January, 2016 | Michael Fimin

Top 5 cybercrime patterns to watch out for in 2016

According to the Chronology of Data Breaches by Privacy Rights Clearinghouse, a nonprofit organization that aims to raise awareness about how technology affects personal privacy, the number of companies that experienced a data breach in 2015 reduced by 44% since 2014. At first glance, it would seem...
Show more articles