Entries by Eric Hess

Iran’s Cyber Warfare Capacity – A Threat Without Boundaries

Iran’s Cyber Warfare Capacity
The United States has had a protracted adversarial relationship with Iran dating back to the end of the Islamic Revolution in 1979.  In 2010, the U.S. and Israel infected computers running Iran’s nuclear program with the Stuxnet virus in an attempt to slow Iran’s progress toward nuclear capability. Since that time, the adversarial relationship has increasingly played out in cyberspace.  Iran has invested heavily in...

Cyberattacks On Municipalities & Government Machinery Surge

Municipalities and other forms of government are under constant threat from cybercriminals. Learn how to prevent cyberattacks, and safeguard digital assets for enhanced cybersecurity and risk management
How To Prevent An Attack & Protect Information Resources As a precautionary measurefollowing a possible Ryuk ransomware attack on government information infrastructure, the mayor of New Orleans declared a state of emergency. This is one example of many attacks that have taken place over the last year. Municipalities and other forms of government are under constant threat from cybercriminals.Learn how topreventcyberattacks, andsafeguard digital assets for enhanced cybersecurity and risk management.  At 5:00 am, CST,...

Cost of Cybersecurity

What is the Cost of Effective Cybersecurity? Organizations across the globe are getting more familiar with the need for a robust cybersecurity strategy, protecting their processes, proprietary information, and confidential client data. The problem that arises is not in their awareness of their IT security needs, but in the implementation of a comprehensive plan to fend...

The Sudden Surge in DDoS Attacks

DDos attacks
Learn how to protect your company’s cloud resources with configuration management, port monitoring, and security auditing tools.  When Criminals Want to Shut Down Your Company’s Access to Cloud-Based Data and Workflow, They Often Implement a DDoS Attack.   A DDoS (Distributed Denial of Service) attack happens when criminals flood your cloud servers and bandwidth with so much traffic that your employees...

Getting Started: Building the Foundations of Cybersecurity for Small to Medium-Sized Businesses

Cybersecurity
Cybersecurity has become a significant concern for all businesses. Most businesses have, at least, attempted to put in measures to secure their systems. While at it, small to medium-sized businesses or enterprises (SMEs) have shown lesser concern for the need for cybersecurity compared to larger firms. Often belittling the probability of attacks, SMEs risk their cyber infrastructure even more....

Good Cloud Security Management Starts with Security Policy Monitoring and Deployment of Appropriate Cloud Security Solutions

Cloud Security Solutions / tools
Cloud security solutions providing automated policy auditing and enforcement are easy ways to manage the significant risk posed by policy deviations.  This article will illustrate how policy contributes to cloud security, highlight the challenges of policy auditing and enforcement that can potentially be resolved with cloud security solutions, and suggest a strategy for baselining...

People, Process, and Technology: The Trifecta of Cybersecurity Programs

Cybersecurity program
Introduction Ensuring that your company’s systems are protected against cyberattacks depends on the proper functioning of each element of your cybersecurity program.  Those core elements are people, process, and technology.  It starts with your team or your “human firewall”, since this can be your weakest link if you neglect it.  Both your people and your...