Key Components in a Security Operations Center

Cyber-Attacks have grown significantly in complexity, rendering the majority of ‘Off the Shelf’ detection solutions ineffective. In addition, due to advanced subterfuge techniques, malware often goes unnoticed by system administrators despite being clearly visible to experienced investigators. We have to rely on the human factor, i.e. the analysts, to outsmart the sophisticated attackers. An effective…

Read more

How Multi-Factor Authentication can Combat Phishing, Cyber Attacks

  What is multi-Factor authentication? This is considered to be an essential security tool presently required by most industries nowadays to be utilized in the fight against advanced cyber-attacks and phishing. Typical scenarios for multi-factor authentication include ATM fund withdrawals and online shopping. With Two-Factor Authentication there are two passwords required to process an ATM…

Read more

Cryptojacking: How Hackers are Mining Cryptocurrencies without Your Knowledge

What is Crypto-jacking? There are two types of Cryptojacking: File-based Cryptojacking File-based Crypto-jacking requires a corporate network in conjunction with a malware based infiltration.   Many of these attacks are self-propagating, spreading through the network, and creating enormous cleanup costs. They may also drop additional malware in the internal system as they propagate. Browser-based Cryptojacking…

Read more

Security Operations Centers based on Industry Specifications

Security Operations Center should be different based on Supported Industry Specifications Not all Business Sectors or industries require the same Security Operations Center roadmap. In this article we take a look at how Security Operations Centers differ within the Education, Public Safety, and Public Events business sectors. Educational Security Operations Centers Today’s Education Security Operations…

Read more

Phishing Facts: The simple Truth

Facts about Phishing The term Phishing is referred to as social engineering which utilizes the digital world for malicious purposes. Information systems are paramount to the success of all businesses. Phishing has created a means in which these Information Systems are vulnerable to cyber-attacks. Some facts about Phishing: Over the last three years, Phishing attacks…

Read more