network traffic monitoring

Have You Been Cryptojacked?

Hidden in the thicket of JavaScript, a permission-less browser-based mining script may be  patiently waiting to exploit your CPU resources — and you wouldn’t even know it. It’s called cryptojacking and the threat is on the rise. Here’s what you need to know to help prevent it.

Read More

Creating a Layered Security Approach

"Imagine a typical Seattle weather day (excluding July and August maybe). You’re heading out for a mixed day of fun and errands that may include visiting the local farmers market, taking the dog for a walk, making a trip to a taco truck, and maybe a hike around Discovery Park. You’ll do some walking, some driving and move between indoors and outdoors. How do you dress for this multi-faceted excursion? Layers. The answer is always layers."

Read More

Are You Compromising Security for Convenience?

"The typical computer network usually has a closet full of skeletons. Now, there could be more than one closet in any organization, but here I speak of the IT closet, and its name is convenience. It is filled with seemingly harmless security compromises designed to make work more enjoyable, and in the short term, more productive. Filling this closet usually occurs slowly over time, not overnight, and the effects can have serious consequences."

Read More