DNS Tunneling

DNS Tunneling – What it is & How To Stop it in its Tracks

In 2021, SolarWinds fell prey to a massively stealthy cyberattack that used DNS tunneling to remain undetected for 8 months.  SolarWinds is now facing projected losses of roughly $90 million USD directly related to this breach. What is DNS tunneling, though? How can businesses protect themselves from suffering the same fate as SolarWinds? DNS tunneling

DNS Tunneling – What it is & How To Stop it in its Tracks Read More »

lateral movement

What is Lateral Movement? + Detection & Defense Measures

Lateral movement is a lesser known but incredibly insidious hacking tactic. It is a significant step in many different common cyberattacks, and it can be difficult to trace in your network. This subtle kind of attack can be incredibly devastating to a small business. What exactly is lateral movement? Lateral movement occurs when a hacker

What is Lateral Movement? + Detection & Defense Measures Read More »

coffee shop public wi-fi

Top Cybersecurity Risks Of Working From A Coffee Shop

REad About Top Cybersecurity Risks Of Working From A Coffee Shop Your favorite coffee shop might seem like a secure place to work with its warm ambient lighting, comfy chairs, and familiar barista faces. But that sense of security can be extremely false. The fact is, coffee shops are a prime hunting ground for cybercriminals.

Top Cybersecurity Risks Of Working From A Coffee Shop Read More »

advanced persistent threat APT

What Is An Advanced Persistent Threat (APT)?

Ransomware, trojans, business email compromise scams – the list of cyber threats to businesses expands every year. Keeping track of threats, how they work, and how to defend your business is a full-time job itself. One of the most prevalent and insidious threats businesses face are advanced persistent threats (APTs). What is an APT? Why

What Is An Advanced Persistent Threat (APT)? Read More »