How Password Spraying Could be an Attack Vector Into Your Organization
There are two common ways the bad guys might try to break into a building: spend lots of effort on one door or window, or try each door and window to see if one is easier to enter than the others. The same is true for attackers trying to compromise systems and networks (and penetration […]
What is a Stingray And How Does It Impact Me?
According to news reports from outlets including IDG’s CSO, the US Department of Homeland Security said in early April of this year that there are unauthorized “stingrays” in the Washington, DC areas and in “other cities.” To be perfectly honest, I cannot find the term stingray in the documents I read, and “StingRay” is a […]
Should I Become a Certified Ethical Hacker?
Maybe you’ve heard a little about the Certified Ethical Hacker or CEH exam. You probably have some questions: What is a certified ethical hacker? How does a CEH fit into an IT organization? How do you get certified? What knowledge and skills are crucial to success? How does CEH relate to other cybersecurity certifications? Let’s […]
Quad9 as a Tool to Fight Business Email Compromise
Business Email Compromise or BEC is not a new cybersecurity attack vector, but it is gaining more attention as it is becoming more common. The basic idea is that a scammer or con-artist uses deception to pretend to be a high-level official of an organization in order to compromise that organization or to otherwise profit. […]
Why a Certification is Only a Start
Certification and credentialization are requisite parts of today’s business landscape. The field of Information Technology is no exception. Learning Tree offers a broad range of IT certifications for employees with varying skill levels. I received my first IT certification in 1985 from The Institute for the Certification of Computing Professionals, now known as the ICCP. […]