DoS attacks are one of the most dreaded form of network attacks among Enterprises and SMBs since they could paralyze network activity completely. The after-effects of these attacks are even more that they have a long-standing impact on the image of the brand if the company caters to the consumer segment. If Amazon has a DoS attack on its network, it will hit the headlines in a few hours.
March Madness is here. Will your Enterprise Network remain sane?
The annual NCAA Men’s Basketball Championship season has started and we will soon see the frenzy reaching its peak with the regional semifinals scheduled for 22nd, Thursday and 23rd, Friday of this month. March Madness causes a decrease in enterprise productivity with employees watching streaming videos (including High Definition), reading or checking game stats online. Add to this, employees updating their opinion or commenting on someone else’s through social media tools like Facebook and Twitter, and your network is bound to see a lot more madness
The ABCs of SLAs
Service levels are very critical in a network-dependent business setup. Large Enterprises have embraced network as their backbone for all forms of internal and external communication. In this scenario, to ensure acceptable service levels is no longer the problem statement
Launch secure, browser-based Windows RDP, SSH and Telnet sessions from Password Manager Pro
Launching remote login sessions: Ease of use Vs Security Organizations are deploying privileged password management solutions to mitigate cyber threats and control access to sensitive IT resources. Access requirements themselves are changing in response to evolving business demands such as partners and contractors requiring remote access to internal resources. In turn, IT is seeking solutions that are secure, easy to use and let end users launch a remote login session with a single click, regardless of the target system type or authentication method and, at times, without disclosing the passwords.
Tracking Workstation Logon/Logoff using ADAudit Plus
Before getting into the specifics, I would like to give a small introduction on tracking Logon / Logoff in Active Directory environment, which is a cumbersome process. Auditing the Windows Active Directory environment Logon Auditing With the current Windows architecture it’s difficult to get all logon data at a single point
Network Security Breaches – What to do after?
Network uptime and bottom line go hand in hand for enterprises dependent on online sales. According to an online DoS attack cost calculator 1 , an enterprise with annual revenue of $10 Million USD, of which at least 10% comes from online sales, can lose up to $100K USD per DoS attack! The year 2011 came to be known as the “Year of the Hack”, a time when we saw small and big enterprises falling victim to network security breaches, advent of industrial malwares like Duqu (Based on Stuxnet ) which can lay dormant for months and attack when needed (That was not the outline of an alien invasion movie), zero day malwares, increased DDoS attacks and more. As per some reports, it is estimated that around One Thousand DoS attacks occur 2 every single day and there are around Three Thousand active Command and Control (C&C) centers 3 which can carry out DoS attacks.
Worried of FBI’s Blackout? Let ME help you to fix your DNS
This is in continuation with this post on FBI shutting down the stand-in DNS Servers on March 8, 2012 and its implications In short, the computers affected by the DNSChanger Trojan will not be able to connect to the internet after March 8 until the DNS Settings have been fixed. The DNS Checker tool discussed in the above blog post helps you primarily find whether your system is infected with the DNSChanger Trojan. You will have to fix your DNS Settings manually to be able to connect to the internet.
The FBI is on your back – beware! Stay safe with ME
Look who is chasing malware now. It’s the FBI of the United States. After busting all the bad guys in the world (sometimes even inside countries considered friendly to them) they are now on to a new hunt – the deadliest DNSChanger Trojan malware.
Flexible NetFlow configuration in Cisco 4500 with Supervisor Engine 7-E and Cisco IOS XE
Catalyst 4500 series switches with Supervisor Engine 7-E and Cisco IOS XE Software Release 3.1.0 SG supports Flexible NetFlow. Hence we thought of sharing the configuration information with you. The configuration of Flexible NetFlow in these switches is similar to the other regular Flexible NetFlow .
Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]
In the previous four posts , we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong policies, haphazard style of privileged password management and lack of proper activity monitoring give room for security incidents