About Mihai
This author has yet to write their bio.Meanwhile lets just say that we are proud Mihai contributed a whooping 128 entries.
Entries by Mihai
Security Information & Event Management
April 25, 2023 in IT Security /by MihaiWhat is a SIEM solution? A Security Information and Event Management (SIEM) solution is a 24/7 intelligent threat detection system. It collects logs, makes statistical correlations, analyzes threat alerts across your network, combines data from several different sources, and helps security teams remediate issues before they cause serious damage to your company. Your firewalls, intrusion […]
Physical Servers Vs. Cloud
March 27, 2023 in Tech Tips /by MihaiThe differences between a physical server and a cloud server can create confusion. In just a few words, a virtual server that is hosted by a cloud computing company (Microsoft Azure, Amazon AWS, and Google Cloud are the most common), known as a cloud server, allows users to utilize its resources remotely just by using […]
Differences Between NOC And SOC
February 27, 2023 in IT Security /by MihaiNetwork Operations Centers (NOCs) are responsible for maintaining a company’s computer system’s technical infrastructure, while Security Operations Centers (SOCs) are responsible for protecting the organization against cyber threats. The Network Operations Center (NOC) A typical NOC team includes engineers and technicians who cautiously track an IT infrastructure. The team has many responsibilities, such as network […]
Securing The Hybrid Workspace
January 30, 2023 in IT Security /by MihaiWith a more distributed workforce, your organization is exposed to a series of new threats. Everything must be monitored to ensure that if anything goes wrong, the issue does not lead to a massive data breach in your business. Keeping your hybrid office setup safe can be challenging. By taking the time to understand the […]
Most Common Types Of Malware
December 28, 2022 in IT Security /by MihaiMalware uses a vulnerability to breach a network when a user clicks a dangerous link or downloads/opens an email attachment, common methods used to install malicious software inside the system. The term malware includes various types of threats including spyware, viruses, and worms. Malware and malicious files inside a computer system can: Deny access to […]
Denial-of-Service & Distributed Denial-of-Service Attacks
November 28, 2022 in IT Security /by MihaiA denial-of-service attack overwhelms the system’s resources so that it cannot respond to service requests. A distributed denial-of-service attack is also an attack on system’s resources, but it is launched from a considerable number of other host machines that are infected by malicious software all controlled by the perpetrator. Unlike attacks that are designed to […]
Types Of Cybersecurity Attacks
October 24, 2022 in IT Security /by MihaiA cyberattack is a deliberate attempt to breach the information system of an individual or an organization. Below we describe some of the most common types of cyberattacks. Man-in-the-middle (MitM) attacks This type of attack occurs each time a hacker gets fraudulent access to a client-server or other private communication. The most common types of […]
What To Do After A Data Breach?
September 26, 2022 in IT Security /by MihaiAll organizations face the risk of a data breach because of a cyberattack or another type of security incident. Recovering from such an incident could be complicated, no matter how big or small your company is, especially if sensitive data is exposed. How To Respond To A Data Breach? If your business is the victim […]
How to create an incident response plan?
August 29, 2022 in IT Security /by MihaiAn incident response plan is a well-documented plan that includes a series of phases that helps IT security professionals recognize and properly react to cybersecurity incidents. According to Gartner, the SANS Institute (founded 1989) is one of the world’s premier cybersecurity training organizations. The SANS Institute methodology includes 6 incident response phases as follows: Preparation, […]