Categories
IT Security

Digital Certificates

What is a Digital Certificate? A digital certificate is an electronic credential that confirms the identity of a device, server, or user through the use of cryptography and the public key infrastructure (PKI). Digital certificates are issues by a trust service provider (TSP) or a certification authority in order to help organizations to ensure that […]

Categories
Government IT Security Outsourced IT

Health Data Breach

What is a Health Data Breach? A data breach is an incident that results in the exposure of confidential, private, protected, or sensitive information to a person or entity that was not authorized to access it. A data breach can be caused by actions that were either accidental or intentional. Some examples of data breach […]

Categories
IT Security

Initial Access Broker Markets

What are Initial Access Broker Markets? Initial access brokers are malicious actors that specialize in breaching corporate networks and then selling that access to cyberattackers in Dark Web markets. Initial access brokers have been around for more than a decade. Initial access brokers initially sold access to cyberattackers with various goals such as stealing intellectual […]

Categories
Application Security IT Security Outsourced IT

Remote Desktop Protocol

What is Remote Desktop Protocol? The Remote Desktop Protocol (RDP) is a technical standard for using a desktop computer remotely. Remote desktop software can use several different protocols including Independent Computing Architecture (ICA), Virtual Network Computing (VNC), and RDP. RDP, the most commonly used protocol, was initially released by Microsoft and is available for most […]

Categories
IT Security Outsourced IT

Rootkits

What are Rootkits? A rootkit is a covert computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term “rootkit” is a connection of the words “root” and “kit”, derived from Unix and Linux operating systems where the most privileged account admin is called the “root” and applications […]

Categories
Application Security IT Security

PUPs

What are PUPs? Potentially unwanted programs (PUPs) are software programs that are often installed when other software is being installed on a computer. PUPs often serve as marketing tools and may modify browser settings to display advertisements; this form of PUP is referred to as adware. PUPs differ from other malicious programs such as worms […]

Categories
IT Security Outsourced IT

Patch Management

What is Patch Management? Patch management is the process of identifying, testing, and installing patches (code changes) on existing applications and software tools on a computer in order to fix bugs, close security holes, or add features. Patch management is a critical process as it helps to keep computers and networks secure, reliable, up to […]

Categories
IT Security Outsourced IT

Jailbreaking and Rooting Mobile Devices

What are Jailbroken and Rooted Mobile Devices? Jailbreaking and rooting refer to removing software restrictions that are intentionally put in place by the manufacturer in order to access more applications and/or features. Jailbreaking is the term for this process as it happens on an Apple device, while rooting refers to this process as it happens […]

Categories
IT Security Outsourced IT

BIOS Security

What is BIOS Security? Basic Input Output System (BIOS) is software stored on a small memory chip on a computer’s motherboard. It has a number of different roles, but its most essential function is to load the operating system. When the computer is turned on, the microprocessor tries to execute its first instruction, which the […]

Categories
IT Security Outsourced IT

Healthcare Legacy Systems

What is a Healthcare Legacy System? A legacy system is a system that is no longer supported by its manufacturer, which puts an end to updates and security patches that organizations rely on for cybersecurity and continuous operation. Legacy systems can include devices, operating systems, applications, or processes. The healthcare industry has a significant legacy […]