Skip to main content
Category

Cybersecurity

Horton Hears A Host! – Part 3

By Cybersecurity
Welcome to the third post in our multi-part Seusstastic series on the real threats that face home networks, where we apply real-world enterprise grade protections to keep ourselves safe in the connected world. If you haven’t read part 1 or part 2, I highly recommend you take a few minutes and do so. We've covered how cyber thieves are constantly testing and scanning for vulnerabilities and what you can do to start acting like the bad guy - finding the systems on your network. We left you with the following point: devices that we previously would never have imagined to exist on a…
Read More

One Host, Two Hosts, Red Host, Blue Host – Part 2

By Cybersecurity
This is the second post in our multi-part Seusstastic series on the real threats that face home networks, where we can apply real-world enterprise grade protections to keep ourselves safe in the connected world. First off - If you haven't read part 1, I highly recommend you take 5 minutes and do so. In part 1, How The Grinch Stole... Your Information, I presented a simple construct: Cyber thieves are not only just outside your physical and digital homes, they are constantly testing and scanning for vulnerabilities. The argument is simple: Thieves will be thieves and you can't just sit back…
Read More

Why the MySpace Breach Matters, Even if MySpace Doesn’t

By Cybersecurity
You may have seen over the last few days reports of MySpace username and password combinations for sale on hacker spaces. MySpace was breached, and a possible 360 million accounts with 427 million passwords could have been stolen. Yes, MySpace has long since been dominated by almost all other social networks that you can think of today.  So who cares? You should. The first topic applies directly to the user - password reuse. We have talked about this numerous times in previous blogs, and the point still stands. The odds are favorable that either you or your coworkers have/had an account with MySpace.…
Read More

Locking Down Your Endpoints

By Cybersecurity No Comments
As we have mentioned numerous times in our blog posts, your company's biggest security vulnerabilities are its users. While security awareness training is a huge step in the right direction, it is not a foolproof plan to stop a user from opening a malicious attachment or surfing to a web address that hosts nefarious intentions. There are many tools that a security professional can use to help mitigate the risk.  They range in price from reasonable to astronomical, as most software suites tend to do. This blog post isn't about those. We're focusing our efforts this week on an oft-overlooked tool that's already…
Read More

Alpine Says…

By Cybersecurity No Comments
Ever wondered what makes Alpine tick?  We decided to create this post to give our faithful readers some personal insight into how we see the world.  Read on to take a journey into the minds of a few of our engineers and architects -- and to have a little fun. So without further adieu, here is the first installment of Alpine Says. What are some of your favorite blogs to read to keep on top of the technology world? Steve: AWS Security, Full Disclosure, and High Scalability keep me busy enough.  Wired and Engadget keep me in touch with the consumer market…
Read More