G2 Security Expert

Helping Tomorrow's Future

Menu
  • Privacy Policy
  • About Us
  • Small Business
  • For Your Home
  • G2 Threat Update

SMS Phishing – A real world kill chain review

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews

A few days ago as I was walking out to the door headed to a meeting when my phone dinged.  It was a new SMS message that read “do not show anybody i sent that” and contained a linked.  It came from a number not in my contact list so I just ignored and thought […]

Read More »

Malicious Chrome Extensions – A Drive by Download

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Definition of a Drive By Download: Google: “A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or “exploit”) a browser, app, or operating system that is out of date and has a security flaw.” Case Study: Late last week while traveling […]

Read More »

Customer Identity Landscape is Evolving

No Comments
| Small Business, Uncategorized

From every eCommerce store, micro site, to blogs there is a need/desire to capture customer identities.  With this need there becomes challenges and legal considerations around the customer’s privacy.  The challenges can also lead to opportunities for better customer engagement which will lead to more sales, views, and other targeted business metrics. First let’s cover […]

Read More »

Why Anti-Virus is Not Enough for Your Endpoints!

No Comments
| G2 Threat Update, Small Business, Threat Reviews

Rather you purchased a new laptop from Best Buy or was issued one from your IT department the odds are it came with antivirus software.  Antivirus software is designed to detect and ultimately quarantine and remove viruses from machines. Antivirus software mitigates many forms of malware such as keyloggers, backdoor, trojan horses, and so on.  […]

Read More »

WiFi Access Points – What you need to know!

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews

Is your office on a WiFi hotspot?  Do you connect to your local Starbucks, hotel, or at the gym?  Chances are you connect to WiFi to save from costly cellular data plans. Also, as more and more enterprises are enabling WiFi these access points are ripe for malfeasance.  Let’s look at a WiFi kill-chain to […]

Read More »

Hybrid Architectures – You Have Choices

No Comments
| Small Business, Uncategorized

Network architectures have evolved vastly over the last 10 years.  When connecting enterprise users to the data center (on-premise or in the cloud) you have options for access.  Let’s look at a these hybrid architectures and how the perimeter is changing to support zero trust practices. Network Micro Segmentation Really from the beginning we’ve been […]

Read More »

Top 6 Considerations for Identity Management

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Managing identities correctly will not only give your business a competitive advantage but it will also make you more secure. Rather you are managing employee, customer, or contractor identities you must take into consideration how you are going to not only use this information but also how to keep it secure.  If you don’t have […]

Read More »

Trust and Verify – 3 Reasons Why You Shouldn’t

No Comments
| Small Business, Uncategorized

We all read the headlines about the latest breaches, vulnerabilities, regulations, etc.  The reason for the news worthiness is that this impacts everyone.  No one is immune in this digital world as was evident in the Equifax breach that affected 143 million Americans. In the enterprise world where technology lives within an organization there are crown […]

Read More »

CVE’s – What You Need to Know!

2 Comments
| G2 Threat Update, Small Business

Part of any good security hygiene program is to make sure you are up to date with the latest security patches.  As of May 22, 2018  there have been 11,555 common vulnerability and exposures reported.  In 2017 there were a total of 53,976 CVE’s reported. These numbers are daunting to say the least.  In small […]

Read More »

What this old fire truck reminds me of!

No Comments
| For Your Home, Small Business

Recently while attending RSAC in San Francisco an old fire truck was out for community education close to the financial district. As a kid fire trucks were always fascinating and the men and women brave enough to be a first responder were truly heroes to me.  As a kid my father worked for the local […]

Read More »

Posts navigation

1 2 Next

Please follow & like us :)

LinkedIn
Twitter
Follow by Email
Facebook
Google+
https://www.g2expert.com">

Recent Post

  • SMS Phishing – A real world kill chain review
  • Malicious Chrome Extensions – A Drive by Download
  • Customer Identity Landscape is Evolving
  • Why Anti-Virus is Not Enough for Your Endpoints!
  • WiFi Access Points – What you need to know!

G2 Security Expert 2023 . Powered by WordPress