top of page
Search


Seven Reasons Why Trading Security for Convenience is Risky Business
In our fast-paced, tech-driven world, convenience is king. We all crave it, and businesses strive to provide it. Whether it's online...
echoudhury77
Oct 19, 20232 min read
25 views
0 comments


The Hidden Dangers of Unsecured Devices on Your Network
In a complex interconnected world, we rely on networks to facilitate communication and data exchange. However, this convenience comes...
echoudhury77
Oct 12, 20233 min read
27 views
0 comments


STOP using Remote Desktop Web Access!!
Remote Desktop Web Access (RDweb) is a web based remote desktop client. It was created by Microsoft to allow remote access to programs...
echoudhury77
Nov 1, 20223 min read
221 views
0 comments


SIM + SEM = SIEM | And why you NEED it
In the digital world we live in today it is safe to say that security for all devices should be a priority. With many bad people who want...
echoudhury77
Oct 14, 20223 min read
48 views
0 comments


Red Team / Blue Team
Security is one of the most important parts of an organization, and with most vital information being digital, cybersecurity is more...
echoudhury77
Oct 13, 20222 min read
22 views
0 comments


Zero Trust
Originally, the basic assumption was that everything within the security perimeter was secured. Most data was secured in the confines of...
echoudhury77
Jun 30, 20222 min read
29 views
0 comments


IoT: The network that surrounds us
What is IoT? IoT, or Internet of things, is a term that is used to refer to devices that connect to the internet. The interesting part of...
echoudhury77
Jun 3, 20223 min read
21 views
0 comments


Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
echoudhury77
Mar 15, 20223 min read
24 views
0 comments


Disaster Recovery-as-a-Service (DRaaS)
Disaster recovery as a service (DRaaS) is a cloud computing software service model that allows an organization to back up it data and...
echoudhury77
Dec 9, 20212 min read
24 views
0 comments


The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...
echoudhury77
Oct 25, 20212 min read
16 views
0 comments


Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...
echoudhury77
Oct 21, 20212 min read
22 views
0 comments


When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...
echoudhury77
May 6, 20212 min read
20 views
0 comments


Hackers love your servers
3 Reasons hackers love your servers
echoudhury77
Nov 12, 20192 min read
23 views
0 comments


Falling Down: Healthcare Information Security.
This post is courtesy of a guest writer with decades of experience in public and private healthcare. As a BSN and RN for over 20 years, I...
echoudhury77
Nov 11, 20192 min read
23 views
0 comments


Do you want to Detect or Prevent?
Do you want to just detect threat actors if they try to intrude in your network, or do you want to prevent them from even trying?
echoudhury77
Aug 14, 20192 min read
23 views
0 comments

Cybersecurity is a Public Health Issue
As security advisors, we are constantly looking for ways to convince organizations, companies, local governments, and schools about the impo
echoudhury77
Jan 20, 20193 min read
19 views
0 comments

Things about the Dark Web
Those of us that know and live in the Dark Web tend to find people get confused when they hear the term "Dark Web."
echoudhury77
Jan 16, 20191 min read
25 views
0 comments


The Insider Threat
We tend to think of cyber threats as coming from an anonymous or state-sponsored criminal, but it can come from your own employees.
echoudhury77
Nov 2, 20182 min read
21 views
0 comments
bottom of page