Hardening Windows security: How to secure your organization—Part 3

This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks. If you missed last week’s blog, you can read it here.

 LOTL attacks are also known as “malware-free” attacks because your own tools are used …

IT Security 2 min read Read

Breaking down the San Francisco airport hack

On April 7, 2020, the San Francisco International Airport (SFO) released a notice confirming that two of its websites, SFOConnect.com and SFOConstruction.com, were targets of a cyberattack in March 2020. The attack has been attributed to a hacker group that …

IT Security 2 min read Read

VPN 101: Streamline operations and ensure business continuity with the right VPN [ Free e-book ]

types of vpn

In the ever-evolving business landscape, remote work has become the new normal in light of the COVID-19 pandemic. To maintain business continuity in such a volatile market, businesses are left with no choice but to roll out remote work …

firewallanalyzer 1 min read Read

Hardening Windows security: How to secure your organization—Part 2

We’re back with part two of our three-part blog series on living-off-the-land attacks. If you missed part one, you can read it here. In a nutshell, living-off-the-land (LOTL) refers to a type of attack where the attacker uses the …

IT Security 2 min read Read

Working from home? Be sure to follow these security best practices [Free e-book]

Until now, a majority of enterprises and their employees have been safely protected by their office network’s robust security infrastructure. However, things have drastically changed with the COVID-19 pandemic, and enterprises have been forced to quickly shift to a work-from-home …

firewallanalyzer 1 min read Read

Cybersecurity challenges of the work-from-home model

Just recently, the World Health Organization declared coronavirus a global pandemic. This decision brought with it several health and safety measures, and normal life came to a halt in many countries. This resulted in many organizations around the world adopting …

IT Security 3 min read Read

Hardening Windows security: How to secure your organization—Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game.

 Living-off-the-land attacks, or LOTL, is one …

IT Security 2 min read Read

IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck]

The definition of an “attack” is changing. The level of complexity and technical expertise needed to perform an attack has been simplified because the features that are preinstalled in systems are being weaponized. Attackers are also targeting small and medium-sized …

IT Security 2 min read Read

The rise in cyberattacks surrounding the COVID-19 pandemic

Fear, uncertainty, and doubt are powerful emotions, and time and again, hackers attempt to leverage these for their own gain. As the coronavirus develops into a worldwide pandemic, hackers are taking advantage of the fear many of us feel to …

IT Security 3 min read Read