May 24, 2018

Tag Archives: security

DNS Sinkhole – What is it & Why do I need one?

In this post I will talk about DNS Sinkholing, what it is and how it can help you identify potentially infected machines. Useful in the fight against malware such as viruses, Ransomware and Crypto Jacking! What is DNS? Domain Name System – in very basic terms, the internet (and local networks) are all routed by […]

CCIE Security v5 :: TCP Interception

This article accompanies the demonstration video I have created below. TCP interception is a CCIE Security version 5 blueprint topic. What is TCP interception? TCP interception is a method used to protect against TCP SYN-flooding attacks. This is achieved by intercepting TCP connection requests (SYN packets) and verifying the connection before passing the original TCP SYN packet […]

Security Concerns :: Ransomware

Working for a security consultancy/MSSP business, I come across a lot of customers who in the past have gone to companies seeking advice on a particular security threat that is getting more media attention at that particular moment. More often than not, the “Security Expert” (salesman…) sells them a device; promising them it will fix all […]

How secure is IEEE802.1x?

I’m a huge fan of deploying “dot1x”.  With very little configuration (a Windows NPS server, a little group policy and some access switch commands) you can authenticate every device that connects to your network.  Unlike MAC based security, dot1x ensures that your devices must be successfully authenticated by a centralised RADIUS server before they are […]

CISSP :: Security and Risk Management – Part 1

The first domain we will discuss in my series of CISSP articles will be Security and Risk Management. I will break this down across several posts, with the intention of keeping them “bite-sized” and easier to take on board. I will use the (ISC)2 defined sub-categories of each domain as headings during my posts. Confidentiality, […]

CISSP :: Certified Information Systems Security Professional – Introduction

I have set myself a task this year to achieve CISSP – Certified Information Systems Security Professional. CISSP is a globally recognised certification that encompasses a broad range of IT Security topics. It’s vendor-neutral and well regarded in the industry. To become a CISSP, you must meet the following: You must have completed a minimum of […]

Can RansomFree Protect You Against Ransomware?

  According to ZDNet, the cost of Ransomware hit $1 billion in 2016. Businesses and unsuspecting users were hit with popular ransomware such as Locky and Crylocker and found themselves locked out of their own systems. Many of those affected by ransomware found themselves paying large sums of money to salvage their business critical documents and […]

Lightning Talk: UTM’s

Earlier this week I delivered a presentation about UTM’s to businesses on the Isle of Man. This lightning presentation was aimed to give a brief overview of Unified Threat Management solutions and the considerations to keep in mind. The link below will take you to the presentation, if you have any questions please feel free […]

What Does WhatsApp’s Privacy Mean For You?

No doubt many of you reading this article have already heard or even accepted the new T&C’s from WhatsApp, but what does this mean when talking about your privacy? Well a yesterday WhatsApp published a blog post talking about updating they’re privacy policy for the first time in four years. The main take away from the blog post was the […]

Subscribe to SYNACK via Email