logo dark logo light logo
mobile-logo
18 Aug

An Employee Education Program Is Essential to Security

by Eric
in Network Security
Comments

Earlier this year, the IRS revealed that hundreds of organizations were (successfully) hit a spear-phishing attack. The target? Employee tax documents that included social security numbers, addresses, and wage information.   This...

Read More
10 Aug

A Look at Some Network-Based DDoS Attacks, and How to Protect Against Them

by Eric
in Network Security
Comments

The Distributed Denial of Service Attack has a long and storied history in the cybersecurity space. Originally based primarily on the TCP and UDP protocols, they’ve since expanded to new...

Read More
05 Aug

Should Your Business Deploy A Modular Data Center?

by Eric
in Hosting Architecture
Comments

Traditionally, deploying a data center isn’t the sort of thing just anyone can handle. It’s an extensive, laborious process, requiring a massive cost investment, a healthy dollop of technical knowledge,...

Read More
06 Jul

How Worried Should You Be About Dynamic IPs?

by Eric
in Network Security
Comments

One of the oldest, most tried-and-true methods of defeating a DDoS attack is by blocking the IP addresses used to execute it. Unfortunately, criminals are acutely aware of that fact...

Read More
29 Jun

Where Do You Draw the Line between Manual and Automated Security?

by Eric
in Network Security
Comments

In a recent survey, Radware found that attacks that last only an hour or less are on the rise - and more than half of the three biggest attacks fell...

Read More
27 Jun

How the Digital Attack Landscape Will Change in 2016

by Eric
in Network Security
Comments

By now, digital crime has become so commonplace that news of a new attack is often met with the same level of excitement as a weather report. Unfortunately, this constant...

Read More
27 Jun

Bots Are Getting More Advanced – Are You Prepared To Deal With Them?

by Eric
in Network Security
Comments

The days when you could be certain there was a human presence on the other end of a cyberattack are behind us. Bot-generated attacks targeted at web infrastructure have of...

Read More
22 Jun

How Can High-Risk Industries Defend Themselves From DDoS Attacks?

by Eric
in Network Security
Comments

No one is immune to cyberattacks. As technology continues to march forward and more critical data is stored online, more criminals than ever are targeting businesses through digital vectors. The...

Read More
20 Jun

Five Things You Need to Know about Hacktivism

by Eric
in Network Security
Comments

Not all cyber-attacks are financially motivated. In the modern day, an increasing number of digital attacks are carried out with the intent of delivering a message. The cyber-criminals behind such...

Read More
24 Mar

The Internet of Bots: How a Connected Future Could Give Way to the Biggest Botnets Ever

by Eric
in Network Security
Comments

In October, security firm Imperva reported on a DDoS attack through a somewhat unusual medium. Over 900 CCTV cameras were infected with a variant of a known malware program, and...

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
US Address: 20008 Champion Forest Dr, Suite 103
Spring, Texas 77379 United States
Phone: +1 (877) 512-4678


UK Address: Unit 8 New Barn Farm Tadlow Road
Tadlow, Royston, Hertfordshire, SG8 0EP, UK
                   

Footer

  • Careers
  • Privacy Policy
  • TOS
  • SLA
✕
Sign up for our monthly newsletter and be automatically entered to win a $50 gift card!