top of page
Search
echoudhury77
Oct 19, 20232 min read
Seven Reasons Why Trading Security for Convenience is Risky Business
In our fast-paced, tech-driven world, convenience is king. We all crave it, and businesses strive to provide it. Whether it's online...
25 views0 comments
echoudhury77
Oct 12, 20233 min read
The Hidden Dangers of Unsecured Devices on Your Network
In a complex interconnected world, we rely on networks to facilitate communication and data exchange. However, this convenience comes...
21 views0 comments
echoudhury77
Nov 1, 20223 min read
STOP using Remote Desktop Web Access!!
Remote Desktop Web Access (RDweb) is a web based remote desktop client. It was created by Microsoft to allow remote access to programs...
188 views0 comments
echoudhury77
Oct 14, 20223 min read
SIM + SEM = SIEM | And why you NEED it
In the digital world we live in today it is safe to say that security for all devices should be a priority. With many bad people who want...
45 views0 comments
echoudhury77
Oct 13, 20222 min read
Red Team / Blue Team
Security is one of the most important parts of an organization, and with most vital information being digital, cybersecurity is more...
22 views0 comments
echoudhury77
Jun 30, 20222 min read
Zero Trust
Originally, the basic assumption was that everything within the security perimeter was secured. Most data was secured in the confines of...
28 views0 comments
echoudhury77
Jun 3, 20223 min read
IoT: The network that surrounds us
What is IoT? IoT, or Internet of things, is a term that is used to refer to devices that connect to the internet. The interesting part of...
21 views0 comments
echoudhury77
Mar 15, 20223 min read
Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
24 views0 comments
echoudhury77
Dec 9, 20212 min read
Disaster Recovery-as-a-Service (DRaaS)
Disaster recovery as a service (DRaaS) is a cloud computing software service model that allows an organization to back up it data and...
24 views0 comments
echoudhury77
Oct 25, 20212 min read
The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...
16 views0 comments
echoudhury77
Oct 21, 20212 min read
Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...
22 views0 comments
echoudhury77
May 6, 20212 min read
When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...
20 views0 comments
echoudhury77
Nov 12, 20192 min read
Hackers love your servers
3 Reasons hackers love your servers
22 views0 comments
echoudhury77
Nov 11, 20192 min read
Falling Down: Healthcare Information Security.
This post is courtesy of a guest writer with decades of experience in public and private healthcare. As a BSN and RN for over 20 years, I...
23 views0 comments
echoudhury77
Aug 14, 20192 min read
Do you want to Detect or Prevent?
Do you want to just detect threat actors if they try to intrude in your network, or do you want to prevent them from even trying?
23 views0 comments
echoudhury77
Jan 20, 20193 min read
Cybersecurity is a Public Health Issue
As security advisors, we are constantly looking for ways to convince organizations, companies, local governments, and schools about the impo
19 views0 comments
echoudhury77
Jan 16, 20191 min read
Things about the Dark Web
Those of us that know and live in the Dark Web tend to find people get confused when they hear the term "Dark Web."
25 views0 comments
echoudhury77
Nov 2, 20182 min read
The Insider Threat
We tend to think of cyber threats as coming from an anonymous or state-sponsored criminal, but it can come from your own employees.
21 views0 comments
bottom of page