What You Don’t Know CAN Hurt You; Find Out What’s On Your Network

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” – Sun Tzo, The Art ...

New Global Ransomware Attack

New Global Ransomware Attack
If you haven’t heard yet, there’s yet another global ransomware attack spreading around the globe. As of right now (1:40 pm CST) there doesn’t seem to be a consensus on what type of ransomware it is. Some are claiming it’s a modified version of the Petya ransomware strain, yet others are saying it’s a new ...

Episode 32: Doesn’t It Make You Wanna Cry?

Episode 32: Doesn't It Make You Wanna Cry?
Yet another ransomware outbreak. Were you prepared for Wanna Cry? Will you be prepared next time? In this episode we do a post mortem of the Wanna Cry ransomware outbreak and give you strategies to protect you from this, and similar outbreaks. Notes from this week’s podcast Disable SMBv1 Using Group Policy UPDATE (6/20/2017): We ...

IoT Security is Important To Everyone—What You Need To Know

IoT Security is Important To Everyone—What You Need To Know
The Largest DDoS Ever On September 20, 2016, the largest¹ ever DDoS attack, took place against Brian Krebs. A significant thing about this attack, other than being the largest ever, was the vector, IoT devices. Hundreds of thousands of IoT devices, referred to as an “army of a million hacked devices,” including network-connected webcams, closed-circuit cameras, DVRs, and ...

30: IDS Is Not Dead

30: IDS Is Not Dead
An IDS is one of the most valuable tools we use to secure small business networks. What is an IDS? Are they still useful? How can you use one in your business? We’ll answer these questions in this episode of the Tech Tip Podcast. Links Security Onion Web Site (From the web site) Security Onion ...

29: Trust But Verify

29: Trust But Verify
Trust is the glue that holds society together. But it’s also what allows criminals and con men to take advantage of us. This week we’ll give you some tips on how you may be placing trust in the wrong people or technology, and help you verify that trust is well-earned. Events (new!) Small Business Ransomware ...

Removing Malware—A Step By Step Guide For Microsoft Windows

Removing Malware—A Step By Step Guide For Microsoft Windows
Word Of Warning No matter how hard you work at securing your small office/SOHO network and computers—someone, somehow, somewhere will unknowingly allow malicious malware into the system. The chances of recovery are better if you have planned for this scenario and are prepared to respond quickly. This post serves at least two purposes, first helping ...

5 Security Blogs You Should Be Reading

Monday afternoon I sat in a security briefing full of IT professionals from around the city of Memphis. As the presenter discussed the topic at hand, it was obvious that many of the participants didn’t have any idea what was being discussed. The few questions posed told me that folks aren’t keeping up with what’s going on ...

A Surprising Ransomware Statistic

Update (August 18, 2016). We just assisted a company with a ransomware attack. Check out our “Lessons Learned“. Security Magazine recently reported that 40% of businesses had experienced a ransomware attack in the last 12 months. Even worse is the fact that a third of those businesses lost revenue, and 20% experienced a complete business ...

Tech Tip Podcast Episode 14: Lock Up Your Wifi Part 2

Tech Tip Podcast Episode 14: Lock Up Your Wifi Part 2
Now that you’ve locked down your wireless using the tips you learned in Episode 13, take it one step further to get EXTRA STRENGTH network security! Download episode transcript SOHO Guest Wireless Diagram Subscribe on iTunes Listen on Stitcher David Scott Network ninja, dad, husband, rugby player. I help you secure your digital stuff. http://www.shoestringnetworks.com/david-scott/