How To Start A Cybersecurity Career

how-to-start-a-cybersecurity-career

With ransomware attacks and data breaches in the news on an almost daily basis, businesses in every sector are on high alert. Even small organizations are heavily dependent on technology for normal operations, and the prospect of losing access to their systems or having hackers steal sensitive information is frightening …

Read More

Recovering Hacked Website

  Recovering hacked websites is a common term in Cyber security. Websites can be hacked for multiple reasons. Some of the most common reasons that we’ve seen are account compromise, insecure plugins, and non-restrictive file permissions. We’ve secured these weaknesses through simple steps such as implementing two-factor authentication, updating old …

Read More

5 Steps To Responding To A Vendor Security Questionnaire

To-responding-to-a-vendor-security-questionnaire

How to pass a vendor assessment test? During a previous job, I reviewed the security controls of many businesses that wanted to do business with a famous Hollywood Studio. We’d have an elaborate security questionnaire that we’d send out to vendors to fill up and submit. Having reviewed countless of these questionnaires, I …

Read More

Zero Trust Network

Zero Trust In The Time Of Covid19

What is Zero Trust Network? Zero Trust is somewhat like navigating through a high-security airport where we scan our ticket and validate our identity at multiple points of entry. It is about implementing and monitoring user-access control at a granular level. Zero Trust Network Access (ZTNA) ensures that only authorized …

Read More

Home Office Network Segmentation

secure-home-network-traffic

Most of us who are working from home have a flat network that allows free co-mingling of malicious traffic with clean traffic. In the good old days when we used to commute to work, we would have noticed that payroll systems are isolated from user workstations that are isolated from …

Read More