What are Logging and Monitoring Best Practices? Logging refers to the practice of logging errors and changes or to the application logs that are collected. The purpose of logging is to create an ongoing record of application events. Log files can be used to review any event within a system, including failures and state transformations. […]
Category: Outsourced IT
Packet Sniffing
What is Packet Sniffing? When data has to be transmitted over the computer network, it is broken down into smaller units at the called data packets and reassembled on the receiver’s end in its original format. This data packet (aka- block, segment, datagram, cell) is the smallest unit of communication over a computer network. The […]
Root of Trust
What is the Root of Trust? PSA Certified explains the Root of Trust (RoT) as, “…the foundational security component of a connected device. While precise definitions can vary considerably, a RoT can be described as a set of implicitly trusted functions that the rest of the system or device can use to ensure security; it […]
What is Fiber-Optic Internet Security? Fiber internet is internet access that is delivered over fiber-optic connections, as opposed to the copper wire that broadband connections use, or the wireless signals used by satellite connections. Fiber Internet lines are comprised of hundreds or thousands of glass or plastic cables that are roughly 1/10 the size of […]
Access Point Name
What is Access Point Name? Access Point Name (APN) refers to the gateway and point of entry onto the internet (IP network) from a mobile network. APN is used by mobile service providers to combine many SIM cards into a single limited network. Only SIM cards that are preprogrammed to work on a specific APN […]
Fileless Malware Attacks
What are Fileless Malware Attacks? Fileless malware is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyberattack. Unlike traditional malware, fileless malware does not require an attacker to install any code on a target’s system, which makes it difficult to detect. This fileless technique of using […]
Account Takeovers
What is an Account Takeover? An Account Takeover (ATO) is a type of cyberattack where threat actors take ownership of online accounts using stolen credentials, such as passwords and usernames. Cyberattackers often purchase lists of credentials via the dark web. Credentials found on these lists were often obtained through social engineering tactics, data breaches, and […]
What is Business Impact Analysis? Business impact analysis (BIA) is a method to predict the consequences of disruptions to a business, its processes, and its systems, by collecting relevant data. This data can be used to develop strategies for the business to recover in the case of an emergency. The BIA framework is used to […]
Cipher Suites
What are Cipher Suites? Cipher suites are sets of instructions that enable secure network connections through Transport Layer Security (TLS), often still referred to as Secure Sockets Layer (SSL). These cipher suites provide a set of algorithms and protocols that are required to secure communications between clients and servers. To initiate an HTTPS connection, the […]
What are Cybersecurity Metrics and KPIs? Cybersecurity metrics and Key Performance Indicators (KPIs) are crucial indicators that help security teams analyze how their security controls function over time. Cybersecurity KPIs and cybersecurity metrics are terms often used interchangeably, but there is a slight difference between their meanings- while cybersecurity metrics are quantifiable measurements pertaining to […]