Tagged: Remote Access

  • Are Backdoors Sitting in Your Environment? 

    Are Backdoors Sitting in Your Environment? 

    Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town?  Ever tape a key to your car underneath…

  • Today’s Cyber Challenge: Multi-Site Security With a Diverse Tech Stack

    Today’s Cyber Challenge: Multi-Site Security With a Diverse Tech Stack

    In today’s globalized economy, it’s easier than ever for businesses to operate in multiple locations, with many crossing borders to reach a broader customer base. While this can bring many benefits, it can also create significant challenges, particularly when managing IT and cybersecurity. As organizations increase their reach, they must work with service providers in…

  • Common Entry Points #4 – RDSH

    Common Entry Points #4 – RDSH

    If there is a weak point in your IT environment, it’s only a matter of time before a threat actor exploits it. So far, our series of “Common Entry Points” has scrutinized ITaaS (IT-as-a-Service), VPNs, and unpatched and obsolete OSS, all based on real incidents CYREBRO has dealt with. Now, we’ll look at another common…

  • Common Entry Points #2 – VPN

    Common Entry Points #2 – VPN

    In our last Common Entry Points post, we discussed how ITaaS can be a major weak link, providing bad actors entry into an infrastructure. Another common but often overlooked entry point for attackers is a business’s virtual private network (VPN). Work from home and bring your own device (BYOD) policies have led to expanded attack…

  • Common Entry Points #1 – ITaaS (IT as a Service) Part 2 

    Common Entry Points #1 – ITaaS (IT as a Service) Part 2 

    Assessing the weak links in your company network is an important part of cybersecurity. The people that sit behind the computer keyboards make up some of the weakest links, as there are always a small minority of users that will click on just about anything embedded or attached in an email despite being warned about…

  • Common Entry Points #1 – ITaaS (IT as a service) Part 1

    Common Entry Points #1 – ITaaS (IT as a service) Part 1

    According to SonicWall’s 2022 Cyber Threat Report, nearly every category of cyberattack has increased in volume last year. The numbers point to an undeniable conclusion. SMB networks are under siege. In fact, let’s call it what it is. It’s a war out there. And while cyberattacks may not consist of traditional armies on the field…

Sign Up for Updates