The RLT Blog - Page 14 of 16 - Root Level Technology

The RLT Blog - Page 14 of 16 - Root Level Technology

code

Five Surefire Ways To Make Your Life As A Sysadmin Easier

It’s rough being a sysadmin – that’s really no secret. Not only do you have to keep oft-disparate systems playing nice with one another, you need to have a game plan for pretty much every failure that might occur. Factor in that you’ve probably got users constantly on your back, and that when something goes wrong you’re the one on the chopping block, and, well… You can hardly be blamed for getting a bit stressed. Breathe. We’re here to help. Today, we’re going to go over a few small tips and tricks that you can incorporate into your own workday. Hopefully, they make your life – and your career – easier, even if only slightly. Enforce Strict Mobile Application Controls […]

Continue reading

How You Can Weather An AWS Outage

There’s no such thing as a truly infallible system. Every platform, no matter how extensive or powerful, has points of failure. The Amazon Web Services outages we’ve seen over the years are proof enough of that – evidence that even the cloud can be brought down from time to time. “Outages are a thing that happens, whether your computing is happening in your office, in colocation, or in ‘the cloud,’ which is just a shorthand term for someone else’s computer,” writes Forbes Contributor Justin Warren. “To think that putting applications ‘ in the cloud’ magically makes everything better is naive at best.” That’s something of a bitter pill to swallow, isn’t it? Even if AWS fails infrequently, a single failure […]

Continue reading

The Importance of OSI Model To Information Security: The Modern Threat Surface

With the advent of mobility and the coming Internet of Things, the enterprise threat surface has never been larger, nor the avenues through which criminals can gain access to essential files so varied. In the past, network-level controls were all you really needed to keep your data safe. But times have changed – and if your approach to security doesn’t change with it, then you’ve only yourself to blame when you suffer a breach. What a lot of administrators tend to forget is that protections like firewalls and authentication controls are only part of the equation. Such network-level protections only guard against a very narrow scope and set of attacks. If you want to truly protect your organization, you need […]

Continue reading

Why An Employee Education Program Is Essential To Security

Earlier this year, the IRS revealed that hundreds of organizations were (successfully) hit a spear-phishing attack. The target? Employee tax documents that included social security numbers, addresses, and wage information. This attack didn’t just hit tiny organizations, either. There were several major corporations that fell prey to it, including Snapchat, GCI, and Mansueto Ventures. Yeah – it’s bad. “A new group of phishers is trying a new tactic: sending out emails that appear to be in-house – often from the CEO or CFO – asking HR personnel for the W-2 information of employees companywide,” explains Douglas Bonderud of Security Intelligence. “Since the email looks official and the request seems reasonable, it’s no surprise that several businesses have already been victimized.” […]

Continue reading

A Look At Some Network-Based DDoS Attacks, And How To Protect Against Them

The Distributed Denial of Service Attack has a long and storied history in the cybersecurity space. Originally based primarily on the TCP and UDP protocols, they’ve since expanded to new horizons, as attackers think of new and creative ways to flood and shut down vulnerable systems. That isn’t to say older attack vectors are entirely obsolete, mind you. It’s important to be aware of some of the DDoS methods of yesterday, in the rare event that they make a comeback – which, as you’ll soon see, has been known to happen. Today, we’re going to discuss two of them Teardrop A Teardrop attack (which is really just a fancy way of saying “ip fragmentation) was a relatively simple thing to […]

Continue reading