Categories
IT Security Outsourced IT

Cross Domain Solutions

What are Cross Domain Solutions? The U.S. National Institute of Standards and Technology (NIST) defines cross domain solutions (CDS) as: “A form of controlled interface (a boundary with a set of mechanisms that enforces the security policies and controls the flow of information between interconnected information systems) that provides the ability to manually and/or automatically […]

Categories
IT Security Outsourced IT

DDoS-for-Hire

What is DDoS-for-Hire? Distributed denial-of-service (DDoS) cyberattacks are malicious attempts to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. DDoS-for-hire is a service that allows anyone to perform a DDoS attack, for prices as low as $10 per […]

Categories
Government IT Security Outsourced IT

CIS Benchmarks

What are CIS Benchmarks? CIS Benchmarks from the Center for Internet Security (CIS) are a set of globally recognized and consensus-driven best practices that are designed to help security professionals implement and manage cybersecurity defenses. CIS Benchmarks were developed with a global community of security experts, and the guidelines help organizations protect themselves from emerging […]

Categories
Application Security IT Security Outsourced IT

Android Trojans

What are Android Trojans? Android trojans are malware applications that can perform a variety of malicious activities through your Android device. Two recent large-scale Android trojan attacks include: Nexus Android Trojan. The authors of the Nexus Android Trojan have made the malware available to other threat actors via a malware-as-a-service (MaaS) program, where individuals and […]

Categories
Application Security IT Security Outsourced IT

Antivirus Protection

What is Antivirus Protection? Antivirus software protects devices against viruses and malware through a combination of prevention, detection, and removal. Antivirus software can be installed on computers and other devices, such as smartphones and tablets. The two major types of antivirus protection are1: Traditional antivirus protection. Traditional antivirus software relies heavily upon the signature, or […]

Categories
Application Security IT Security Outsourced IT

Application Lifecycle Management

What is Application Lifecycle Management? Application lifecycle management (ALM) refers to the creation and maintenance of a software application, encompassing the people, tools, and processes that manage the life cycle of an application from its conception to the end of its life. ALM is also known as integrated application lifecycle management, as it involves an […]

Categories
IT Security Outsourced IT

GPS Cybersecurity

What is GPS Cybersecurity? As Global Positioning System (GPS) use continues to increase, it is increasingly important that individuals and businesses consider the security of these systems. Many businesses are dependent on the essential systems on GPS to conduct their day-to-day business, making them clear targets for cyberattackers. Unfortunately, GPSs are quite vulnerable to cyberattacks, […]

Categories
Government IT Security

HIPAA Technical Safeguards

What are HIPAA Technical Safeguards? The Health Insurance Portability and Accountability Act of 1996 (HIPAA, PL104-191) was enacted to protect the privacy and availability of health insurance coverage and medical information. The law’s primary goals include protecting health insurance coverage for workers and their families in the event that the insured employee changes or loses […]

Categories
IT Security Outsourced IT

Geolocation

What is Geolocation? Geolocation refers to the use of location technologies such as GPS or IP addresses to identify and track the whereabouts of connected electronic devices. Geolocation is often used on portable devices to track  the movements and location of people and for surveillance. Some examples of how geolocation is used in the financial […]

Categories
IT Security

XML Injection Attacks

What is an XML Injection Attack? Extensible Markup Language (XML) is an encoding standard that assists in the creation, retrieval, and storage of documents. It consists of a tag structure that identifies specific information within a document1. Unlike HTML, XML is not limited to a specific set of tags, because a single tag set would […]