5 Reasons Your Business Needs a Data Recovery Partner

Have you considered a data recovery partner to help your business or client in the event of a data emergency? While not every business owner may have thought

Clean up Your WordPress Site after Hack and Secure it against Future Threats

WordPress is the most popular CMS (Content Management System) available nowadays online, used by the vast majority of all sites. If you have a look at this r

Incident Response Interview Questions

Introduction Incident response people respond to IT issues such as system down time or emergency hardware outages. They also run reports and attend meetings

Tracking Attackers with a Honeypot - Part 2 (Kippo)

Introduction Unauthorized access to servers occurs on a daily basis. Attackers are constantly searching the Internet for servers that they can use for malici

Data loss prevention (DLP) strategy guide

In this article, we'll learn about the concept of data loss prevention: why it is needed, what are the different types of DLP and its modes of operations, wh

Business Continuity & Disaster Recovery

Business Continuity Within a business continuity plan exists a few steps: Business Impact Analysis (BIA) This involves determining the operational and f

The Top 10 Internet Resources to Use After Suffering a Cyber Breach

Most cyber breaches into your online presence will be directed at your website server and its accompanying databases or accounts. And, if you've been the vic

Building an Incident Response Team and IR Process

In our world today, we have an abundance of many things, among which are -unexpected events. Falling meteorites, terrorist attacks, hacktivist demonstrations

Incident Response Planning

Boring topic? Maybe. But if you believe what Gartner has to say: "Through 2016, 75% of CISO's who experience publicly disclosed security breaches, and lack d

Security Incident Response Testing To Meet Audit Requirements

Description: Practical guidance and tools to ensure maximum readiness for incident response teams including drill tactics. PCI-DSS audits often require IR te