Blocking Foreign IPs
Cyber experts are noting a continuing increase in aggressive cyber attacks, with major players like China, Russia, Iran, and North Korea continuing to lead the way. The Ukraine and Brazil also represent growing threats in the cyber war. The motives behind these foreign IP attacks may include monetary gain, political agenda, or access to confidential... Continue readingSession Hijacking
Session hijacking is the use of a valid computer session to gain access to otherwise prohibited parts of a computer system. Specifically, session hijacking refers to the use of a cookie to authenticate a user to a network that is breached. In this way, the attacker can use that cookie to trick the server into... Continue readingIdentity Management
Many organizations have mission-critical systems that contain sensitive information, such as protected health information (PHI) or personally identifiable information (PII). If those mission-critical systems are breached by hackers, confidential PHI or PII may be extracted, negatively impacting the company’s welfare, operations, and customers they serve. The enforcement of strong identity (ID) management on a system-wide... Continue readingWhat is HTTPS and How Do You Enable It?
HTTP VS HTTPS One of the easiest ways to protect the data of those who visit your website is by enabling HTTPS. HTTP, or Hypertext Transfer Protocol, is what web browsers use to communicate with web servers to display information; this traffic, however, is vulnerable to interception and “sniffing.” HTTPS, on the other hand, takes... Continue reading