Entries by Mihai

Securing The Hybrid Workspace

With a more distributed workforce, your organization is exposed to a series of new threats. Everything must be monitored to ensure that if anything goes wrong, the issue does not lead to a massive data breach in your business. Keeping your hybrid office setup safe can be challenging. By taking the time to understand the […]

Most Common Types Of Malware

Malware uses a vulnerability to breach a network when a user clicks a dangerous link or downloads/opens an email attachment, common methods used to install malicious software inside the system. The term malware includes various types of threats including spyware, viruses, and worms. Malware and malicious files inside a computer system can: Deny access to […]

Denial-of-Service & Distributed Denial-of-Service Attacks

A denial-of-service attack overwhelms the system’s resources so that it cannot respond to service requests. A distributed denial-of-service attack is also an attack on system’s resources, but it is launched from a considerable number of other host machines that are infected by malicious software all controlled by the perpetrator. Unlike attacks that are designed to […]

Types Of Cybersecurity Attacks

A cyberattack is a deliberate attempt to breach the information system of an individual or an organization. Below we describe some of the most common types of cyberattacks. Man-in-the-middle (MitM) attacks This type of attack occurs each time a hacker gets fraudulent access to a client-server or other private communication. The most common types of […]

What To Do After A Data Breach?

All organizations face the risk of a data breach because of a cyberattack or another type of security incident. Recovering from such an incident could be complicated, no matter how big or small your company is, especially if sensitive data is exposed. How To Respond To A Data Breach? If your business is the victim […]

How to create an incident response plan?

An incident response plan is a well-documented plan that includes a series of phases that helps IT security professionals recognize and properly react to cybersecurity incidents. According to Gartner, the SANS Institute (founded 1989) is one of the world’s premier cybersecurity training organizations. The SANS Institute methodology includes 6 incident response phases as follows: Preparation, […]

Azure Active Directory Conditional Access Policies

What is Conditional Access? Azure Active Directory Conditional Access is a feature that helps businesses improve both cybersecurity and compliance. By applying such policies, organizations will refine the authentication process reducing the risk of unauthorized access. Usually, it is the legitimate account owner typing in the username and password pair. Once logged in, the user […]

Benefits Of Using A Password Manager

We all want our sensitive data to be protected, yet some users often rely on weak passwords because memorizing complex passwords is painful. This approach is dangerous. Unless you want to constantly safeguard a hard copy list of all your passwords, you should consider setting up a password manager. Such a solution can help you […]

How to mitigate the risk of a ransomware attack in 2022

As you probably know, malware is a malicious software (file or code) which can: lock a device or make it unusable; take control of certain devices to attack the organization; steal, delete, or encrypt sensitive data. Ransomware is a type of malware that prevents the users from accessing their devices or certain files. Ransomware most […]

Managed Detection and Response

A Managed Detection and Response (MDR) security solution is a high-level 24/7/365 security control that includes a range of security activities including cloud-managed security for organizations that cannot maintain their own security operations center (SOC). MDR services combine threat intelligence, advanced analytics, and human expertise in incident investigation and response deployed at the host and […]