Careful
Security

Tips and Tricks

We give you the latest and greatest cybersecurity tips & tricks, to help businesses and individuals alike!

Securing your Database

During a customary search for vulnerable databases, the team at Comparitech discovered a vulnerable and unprotected MongoDB database belonging to FarFaira, a website designed to promote literacy for children as young as 2 years old. The information on this database includes user sign-in information, email addresses, and social media tokens. Attack Outline While the Comparitech …

Securing your Database Read More »

Ransomware Response Strategies

While companies big and small are susceptible to ransomware attacks, how a company conducts itself in the wake of a ransomware attack can create dire consequences, both for the organization’s reputation and for the data held hostage by attackers. LockBit ransomware attack Take for example Accenture, Inc., a large IT consultancy that found itself the …

Ransomware Response Strategies Read More »

Recovering Hacked Website

Websites can be hacked because of multiple reasons. Some of the most common reasons that we’ve seen are account compromise, insecure plugins, non-restrictive file permissions. We’ve secured these weaknesses through simple steps such as implementing two factor authentication, updating old software, cleaning up malware and setting up a web application firewall to block future attacks.

Zero Trust In The Time Of Covid19

What is Zero Trust Network? Zero Trust is somewhat like navigating through a high-security airport where we scan our ticket and validate our identity at multiple points of entry. It is about implementing and monitoring user-access control at a granular level. Zero Trust Network Access (ZTNA) ensures that only authorized users can access specific applications …

Zero Trust In The Time Of Covid19 Read More »

Home Office Network Segmentation

Most of us who are working from home have a flat network that allows free co-mingling of malicious traffic with clean traffic. In the good old days when we used to commute to work, we would have noticed that payroll systems are isolated from user workstations that are isolated from production servers. The flat network …

Home Office Network Segmentation Read More »

PCI Compliance On A Penny

We recently worked with a client to build a PCI compliant infrastructure in the cloud. Here are some key takeaways from that experience. Becoming PCI compliant is often perceived as a daunting task, as there are approximately 200 requirements that an organization needs to adhere to. However, just like Pareto’s 80-20 principle, here are some …

PCI Compliance On A Penny Read More »

Group 6 CopyCreated with Sketch.

More Information?

Fill out your details and we will get back to you as soon as possible.