cyber security

Cryptolocker Attack

2020-09-24T12:42:32+00:00Categories: Network Security|Tags: , , , , , , , , , , , , |

The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. It is believed that the operators of CryptoLocker successfully extorted a total of around $3 million from victims of the trojan. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. [...]

Blackmail

2020-07-15T07:15:22+00:00Categories: Network Security|Tags: , , , , , , , , |

Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or false information about a person or people unless certain demands are met. Blackmail is characterized as a crime and committing black mail can carry significant criminal and civil consequences. In this post, we'll take a look at blackmails [...]

Microsoft Windows Event Viewer

2020-09-01T12:52:23+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how to monitor the network. We suggest you read it. Event Viewer is a component of Microsoft's windows operating system (Server family and Workstation family) that lets administrators and users [...]

Datadog

2020-09-01T12:52:33+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how to monitor the network. We suggest you read it. In this post, we'll take a look at Datadog Network performance monitor to help you understand the different aspects of [...]

PRTG

2020-09-01T12:52:43+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

PRTG Network Monitor is an agentless network monitoring software. This network monitor tool consists of two main system parts: Core server and Probe. ------------------------------------------------------------------------------------------------------------------------------------------------- These days, one of the most important aspects of cyber security is network monitoring. We have already published a detailed post on the importance and how to monitor the network. We [...]

Solarwinds Network Performance Monitor

2020-09-02T05:49:36+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , |

In this post, we have explained why we should have network monitoring software in our network, and in this post, you have learned how these software work. Now we are going to examine one of the most popular network monitoring software: Solarwinds Network Performance Monitor. SolarWinds is one of the world’s leading producers of IT [...]

GLBA Compliance

2020-09-09T07:10:27+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , , |

GLBA provides limited privacy protections against the sale of your private financial information. Additionally, the GLBA codifies protections against pretexting, the practice of obtaining personal information through false pretenses. The primary concern of GLBA is to ensure the confidentiality of customers' personally identifiable information (PII) and financial information by following certain privacy and security standards. [...]

Free Port Scanner Tools

2020-09-02T05:43:26+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , , , , , |

First of all, we recommend that you read our other post entitled "TCP/UDP Ports". But, what are free port scanner tools? A port scan learns which ports on a router or firewall are open, and can use this information to find a computer system’s potential weaknesses. A port-scanner tool asks about each port, one at [...]

Network Monitoring

2020-12-22T10:21:42+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , |

Monitoring is one of the key components of network security. A network monitoring system (NMS) monitors the network for problems caused by overloaded or crashed servers, network connections or other devices. Network monitoring is a critical IT process where all networking components like routers, switches, firewalls, servers, and VMs are monitored for fault and performance and [...]

Go to Top