Why do I care about someone else’s data breach?

As the size of your organization increases, the probability that an individual employee’s company email is in that breach rises to 1. So how do you go about plugging leaks? A three-point strategy can get you started.

Categories:

Tags:

(Read more…)

Continue reading Why do I care about someone else’s data breach?

Configuring the Windows firewall

While the built-in Windows firewall may offer adequate protection, this is only true if you check the settings on a regular basis, and certainly immediately after removing an infection.Categories: 101
How-tosTags: allowed programsfrstmalwarenetshPiete… Continue reading Configuring the Windows firewall

Threat Modeling – What are you so afraid of?

There are many, many threat models available on the internet with extensive documentation on how to apply them to your organization. Most are designed to map out data flow, identify soft points in organizational processes, and assign mitigations based … Continue reading Threat Modeling – What are you so afraid of?

10 easy ways to prevent malware infection

We told you how to tell if you’re infected with malware. We told you how to clean up the infection if you get it. Now, here’s how to prevent malware infection from happening in the first place.Categories: 101
How-tosTags: exploit kitslayered securitym… Continue reading 10 easy ways to prevent malware infection