Preparing for the Next Big Exploit

An exploit is a type of cyberattack that capitalizes on vulnerabilities in applications, networks, or hardware. It is usually introduced into code during development and is unknown to software vendors, researchers, and the public. Once identified, exploits are categorized according to the type of vulnerability they exploit, such as zero-day, [...]

By |2019-09-12T15:39:14-05:00September 11, 2019|Cyber Security|

Choosing the Right Firewall

Your firewall protects your internal network from the public internet. It is the first line of defense to stop intrusions and malicious attacks from entering your network. The manufacturer of the firewall hardware provides definition files. The firewall scans the network using these definition files, which provide patterns for normal [...]

By |2019-06-25T21:42:22-05:00May 29, 2019|Cyber Security|

Vulnerability Scanning 101

Protecting your network is an essential part of network maintenance. One of the ways you can keep your network safe is by performing regular vulnerability scans. A vulnerability scan is an assessment that checks for vulnerabilities, or weak spots, in your computer, server, network, or infrastructure. How Does it Work? [...]

By |2019-04-24T22:42:54-05:00April 29, 2019|Cyber Security|
Go to Top