Call us now Email a specialist
+353 1 6420100 | info@ward.ie
  • Resources
  • Blogs
  • #100securedays Recap 16

    By Vincent Naughton on October 1, 2019

    “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it.” – Stephane Nappo Recap of week 16 of #100securedays- Day 75: Question the source if you feel something looks strange. Don’t trust anything/everything you see online. Day 76: Attackers flood the server with spoofed ICMP packets sent from a huge...

    • #100securedays Recap 16

      “It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it.” – Stephane Nappo

      Recap of week 16 of #100securedays-

      Day 75: Question the source if you feel something looks strange. Don’t trust anything/everything you see online.

      Day 76: Attackers flood the server with spoofed ICMP packets sent from a huge set of source IPs. The result of this attack is the exhaustion of server resources and failure to process requests. Security tools now help detect & prevent ICMP flood attacks from affecting your network.

      Day 77: Enable the two-step verification feature in your Whatsapp account: Settings-Account-Two-Step Verification. If your number is lost or your phone gets hacked, then this feature will really help secure your account from any malicious activity.

      Day 78: Ping floods are when attackers flood the server with spoofed ping packets from a huge set of source IPs. So an attacker takes down a victim’s computer by sending continuous ICMP echo request. This attack is an evolution of the ICMP flood. Set your firewall or router to ignore the preventable ping packets from the internet.

      Day 79: Instagram is a platform where you get to share your posts with your family, friends and also the world. The more secure you are the better and it is best recommended to keep your account private. We also know that public accounts help you with more followers, engagement etc; which is okay if you want to create your own brand. If you notice any unusual activity in your account, report/block immediately and if necessary delete your account.

      If you would like to speak to our security consultants on best practices to keep your business secure, please contact us to discuss your unique requirements.

    • Latest Blogs