Penetration testing, also referred to as "pen testing" or "ethical hacking", is the process of testing a computer network, application or computer system to identify security issues that could be exploited by a cyber attacker. This testing is also referred to as a "white hat attack" because in a pen ...
April 10, 2019Tommi
DNS hijacking, also referred to as DNS redirection, is a specific type of cyber attack, wherein a "bad actor" can redirect queries to a domain name server, by overriding TCP/IP settings often by hacking and modifying a server's settings. DNS hijacking is frequently used for phishing - displaying fake versions ...
April 3, 2019Tommi
Cyber Security Wheelhouse Solutions protects your business against ever-evolving cyber security threats Cyber attacks are on the rise and only getting more frequent. It is imperative for your business to have an effective strategy to protect against data breaches, malware, spyware and other threats that could compromise your company. Because most businesses ...
July 9, 2018Stacey Larson
Is your door lock worth more to you than the metal it is made from? Most of us would answer “yes” and be grateful for the lock. Can business security solutions deliver both peace of mind and protection while being engineered to stay in front of the newest trends and ...
April 18, 2018Stacey Larson
In the current era of data, we face an ongoing risk of data loss, be it through hacking or system failures. The data you hold on your computer systems is crucial for your business; as such, it is critical that you protect yourself against data loss. Why should you care about ...
August 23, 2016David Schnardthorst
A Distributed Denial of Service (DDoS) attack prohibits access to a computer resource. This kind of assault rarely happens alone but rather occurs in waves once an attacker realizes they have been successful in the first attempt. Using the same method of attack on a business’ computer system, such cyber-attackers ...
June 2, 2016David Schnardthorst
If you have concerns about the security of your business documents on Office 365 or on-premise servers, Azure Rights Management (Azure RMS) may be the solution. This new and innovative technology ensures you have a complete control over your business documents that is extended even after these files are shared ...
April 18, 2016David Schnardthorst