Contact Us Today! 408-927-8700
facebooktwitterlinkedinRSS

NDYNAMICS Blog

This is some blog description about this site

Tip of the Week: Use This Security Checklist to Protect Your Network

b2ap3_thumbnail_security_checklist_400.jpgAs a business professional, you have a responsibility to ensure that your company’s network and data is protected from hacking attacks. It can be difficult to remember to take all of the necessary precautions, but with our help, you can easily outline all of the measures that should be taken to maximize security for corporate data.

Continue reading
0 Comment

The Internet of Things is the Next Big Thing, Are You Ready?

b2ap3_thumbnail_internet_of_things_security_400.jpgWhat comes to mind when you think about the Internet of Things? Tech enthusiasts around the world see hordes of connected devices taking advantage of mobile technologies to augment everyday life; but the realist sees a horde of devices that pose a considerable threat to network security. How can your business ensure maximum security in the face of such a phenomenon?

Continue reading
0 Comment

LastPass Cloud Password Manager Hacked

On Monday, June 15, LastPass officials warned that attackers have compromised servers that run the company's password management service and made off with some master passwords of users of the LastPass service. You can read more detail about the attack here:  http://arstechnica.com/security/2015/06/hack-of-cloud-based-lastpass-exposes-encrypted-master-passwords and here: https://blog.lastpass.com/2015/06/lastpass-security-notice.html/ There's lots of jargon in those article about algorithms, encryption, hashes, anomalies, multifactor authentication, vault contents, SHA's and GPU's.  Enough to make your head spin!  Here's the bottom line: the passwords you store on ...
Continue reading
0 Comment

Where Hackers Go to Shop for Malware

b2ap3_thumbnail_black_market_hacker_400.jpgYou might recall how the Silk Road, an illegal online drug market, was recently shut down. Similar to the Silk Road, there’s another distributor of sensitive information out there; this one dealing with zero-day vulnerabilities. These types of cyber threats sell for top-dollar, and hackers are willing to pay in order to access your network.

Continue reading
0 Comment

Social Engineering: Not All Hackers Target Technology

b2ap3_thumbnail_social_engineering_risky_400.jpgThe nature of hacking is to take advantage of weak points and exploit them for some kind of profit. This is usually seen in flaws or vulnerabilities found within the code of a program or operating system, but these flaws can be psychological, too. Hackers are increasingly taking advantage of a concept known as “social engineering” to fool users into handing over sensitive information that can be used against them.

Continue reading
0 Comment

Newsletter Sign Up

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Upcoming Events