G2 Security Expert

Helping Tomorrow's Future

Menu
  • Privacy Policy
  • About Us
  • Small Business
  • For Your Home
  • G2 Threat Update

Category: Uncategorized

Malicious Chrome Extensions – A Drive by Download

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Definition of a Drive By Download: Google: “A drive-by download refers to the unintentional download of a virus or malicious software (malware) onto your computer or mobile device. A drive-by download will usually take advantage of (or “exploit”) a browser, app, or operating system that is out of date and has a security flaw.” Case Study: Late last week while traveling […]

Read More »

Customer Identity Landscape is Evolving

No Comments
| Small Business, Uncategorized

From every eCommerce store, micro site, to blogs there is a need/desire to capture customer identities.  With this need there becomes challenges and legal considerations around the customer’s privacy.  The challenges can also lead to opportunities for better customer engagement which will lead to more sales, views, and other targeted business metrics. First let’s cover […]

Read More »

Hybrid Architectures – You Have Choices

No Comments
| Small Business, Uncategorized

Network architectures have evolved vastly over the last 10 years.  When connecting enterprise users to the data center (on-premise or in the cloud) you have options for access.  Let’s look at a these hybrid architectures and how the perimeter is changing to support zero trust practices. Network Micro Segmentation Really from the beginning we’ve been […]

Read More »

Top 6 Considerations for Identity Management

No Comments
| For Your Home, G2 Threat Update, Small Business, Threat Reviews, Uncategorized

Managing identities correctly will not only give your business a competitive advantage but it will also make you more secure. Rather you are managing employee, customer, or contractor identities you must take into consideration how you are going to not only use this information but also how to keep it secure.  If you don’t have […]

Read More »

Trust and Verify – 3 Reasons Why You Shouldn’t

No Comments
| Small Business, Uncategorized

We all read the headlines about the latest breaches, vulnerabilities, regulations, etc.  The reason for the news worthiness is that this impacts everyone.  No one is immune in this digital world as was evident in the Equifax breach that affected 143 million Americans. In the enterprise world where technology lives within an organization there are crown […]

Read More »

Please follow & like us :)

LinkedIn
Twitter
Follow by Email
Facebook
Google+
https://www.g2expert.com/category/uncategorized">

Recent Post

  • SMS Phishing – A real world kill chain review
  • Malicious Chrome Extensions – A Drive by Download
  • Customer Identity Landscape is Evolving
  • Why Anti-Virus is Not Enough for Your Endpoints!
  • WiFi Access Points – What you need to know!

G2 Security Expert 2025 . Powered by WordPress