Got Hacked? Netstat To The Rescue

Got Hacked? Netstat To The Rescue Finding Indicators of Compromise Hacked? Are you sure you got hacked? We close out our Indicators of Compromise series with a look at netstat. Netstat is an application available in Windows and Mac that shows network connections on your computer, which applications or services are listening, and who they […]
Are You Leaking Data?

Are You Leaking Data? What You Are Giving Away And Why You are leaking data! Immediately, you scoff. “I’m on a Mac!” “I have the most advanced endpoint protection software on the market!” “My global team of security professionals keeps me safe 24/7!” And you’re still leaking data! How can this be? Simple. Leaking By Design The basics […]
Got Hacked? Windows Tasks & Processes

Got Hacked? – Windows Task & Processes Finding Indicators of Compromise (IoC) This is the second in a series of blog posts where we dive into our systems to find Indicators of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have some malicious tasks. It could have been placed […]
Got Hacked? – Windows Registry

Got Hacked? – Windows Registry Finding Indicators of Compromise (IoC) This is the first in a series of blog posts where we dive into our systems to find Indicator of Compromise (IoC). No, not the Olympic committee. These are clues to tell us we have something running malicious. It could have been placed there by […]
Apple Privacy and Security Myths

Apple Privacy and Security Myths Dispelling the Lies of the World’s Largest Tech Company The Bright Red Apple Apple users beware! Remember The Masque of the Red Death by Edgar Allen Poe? Here are the highlights. Prince Prospero used his wealth to hide the nobles of his land inside his stronghold while the rest of […]
10 Tips To Deter Social Engineering

10 Tips To Deter Social Engineering Only You Can Prevent Data Theft Most office spaces were not designed with security in mind. Multiple entry points, open corridors, and networks ports in unprotected areas are difficult to protect. Those with a single entry post a receptionist or operator as a gatekeeper thinking any human will deter […]
10 Tips To Get Cloud Ready

10 Tips To Get Cloud Ready Sticker Shock May Occur! Many reasons exist that drive businesses to the Cloud. Some want redundancy of services and protection of data their current office environment simply can’t handle. Some want to offer services to all users both in and out of the office. Others see it as a […]
Magic Inside QR Codes

Magic Inside QR Codes The Good, The Bad, and The Hopeful They are everywhere. On television. In the grocery store. At your favorite restaurant. On the bus. In the newspaper. You probably have one within eyesight right now! No, it’s not a cute puppy. I’m talking about QR codes. Denso Wave, a Japanese company, invented […]
Stop Corporate Data Thieves Cold

Stop Corporate Data Thieves Cold Help To Restore Your Peace of Mind Not every employee and asset in your office works for you. Sure, there are those who secretly surf the web or watch videos all day. Those are petty thieves compared to the real insider threats hiding in your organization. How did they get […]
Latest Breach Data Tells All

Latest Breach Data Tells All What We Can Learn From Others’ Failures Verizon recently released its 2024 Data Breach Investigations Report. You can find it here (Link). The report covers over 30,000 incidents, of which over 10,000 were deemed actual breaches. To clarify, their percentages do overlap, so don’t roast me when I quote numbers […]