Technical Support: 412-349-6678 | Incident Response

Tag: blue bastion

Computer with Ransomware

The Growing Impact of Ransomware

You work hard for your paycheck. Just like everyone else, cyber attackers want to make money, too. But, unlike most people, they work through theft, data ransom, and extortion. When attacked, victims feel no choice but to pay up – even despite the poor odds of recovery. To achieve their...
June Software updates

How to Secure Your Outdated Software

Every month, every week, even every day, attackers find new weaknesses to exploit. In turn, software and hardware companies alike issue critical updates to close the gaps. But how do you secure outdated software and hardware when it no longer receives support? You can’t just throw out critical equipment. And...
Port knocking on a keyboard

What Is Port Knocking, and Why Should You Use It?

Can you make your servers invisible to attackers? Well, maybe not in the physical, super-hero sense. But digitally, yes, you can. Port knocking and single-packet authentication (SPA) can hide servers, gateways, and other devices from prying eyes. They help make devices unresponsive to digital probes from the thousands of casual...
April 2022 security patches

January Patches You Need to Address

Ah yes, a new year. Full of opportunity, potential, and unfortunately, new vulnerabilities & patches. With twice the typical volume of patches to address as normal for January, expect your IT team to stay busy. From Microsoft’s update plugging nearly 120 security issues, to Apple and SonicWall’s crucial updates, your...
cyber security customization tactics

The Advantages of Cyber Security Customization

It seems new malware attacks are discovered nearly every day. Why do they keep working? What can you do to prevent them? Computers are built for a broad audience, allowing for a diverse range of software and hardware configurations. This one-size-fits-all approach leads to the general weaknesses upon which malware...