Don’t Get Stung By Hacking Back With Honeypots

Consider this: You are the CEO of a company that has been persistently attacked by hackers. You’ve suffered damage, denial of service, loss of intellectual property, and more. Despite numerous attempts to identify and clean up malware and vulnerabilities, the hackers continue to attack. You decide something must be done. Your company cannot continue to suffer this loss and damage. You want to locate the hackers, if possible, but at a minimum you want to stop or block the attacks and try to recover stolen property.

Read more

What To Do Before and After the CISSP Exam

Before we get to the celebration you’ll have after passing the CISSP, let’s look at some techniques to help you get through the exam. Two of the biggest mistakes people make are not treating it like a marathon and assuming that just because they work in IT or the computer industry, they know the one or more domains on the test and don’t need to study that material.

Read more

What To Do Before and After the CISSP Exam

Before we get to the celebration you’ll have after passing the CISSP, let’s look at some techniques to help you get through the exam. Two of the biggest mistakes people make are not treating it like a marathon and assuming that just because they work in IT or the computer industry, they know the one or more domains on the test and don’t need to study that material.

Read more

How Your Digital Footprint Could Become A Security Risk

Have you ever Googled yourself to see how much of your personal information is online? In many cases it can be pretty scary and include things like your home address, phone number, likes, dislikes, etc. One young man searched for himself and found all of his banking information online. In that case it turned out to be a mistake by a bank employee, exposing the banking information of 86,000 customers.

Read more