Cyber Attacks
- September 04, 2014When attackers look at a target network, they focus on the flaws that they can exploit, then customize their attacks based on these. What can IT admins do knowing that the weakest link usually lie with people, passwords, and places that are considered secure?
- August 14, 2014Targeted attacks are designed to circumvent existing policies and solutions within the target network, making detection a challenge. To do this, IT administrators need to know what to look for, and where to check for signs of compromise.
- July 16, 2014In an ideal world, IT administrators go out of their way to protect the organization's information. However, even IT admins are prone to misconceptions that leave organizations vulnerable to attacks.