“Information security is one of the few spots in the business where you can be involved in almost every part of the business.”
Here’s a recap of week 19:
Day 90: Attackers exploit weaknesses in the Transmission Control Protocol (TCP) connection three-way handshake, which is the communication process between the client, the host, and the server. Attackers send SYN packets to the aimed server as a spoofed message until the table memory connection of the server is exhausted causing the entire service to shut down. #100securedays
Day 91: If you’re interested, you’ll do what is convenient; if you’re committed, you’ll do whatever it takes. – John Assaraf Don’t take the risk and the easy way out. Stay secure! #100securedays
Day 92: Timely patching or timely installation of software update ranks as the top cyber security measure in preventing remote code execution attacks.#100securedays
Day 93: If you go through your device, you’ll see a lot of information stored in there. Encrypt your files and folders especially the one’s that contain sensitive data. #100securedays
Day 94: Believe it or not, 38% of Microsoft Office formats such as word, powerpoint and excel were found to have malicious file extensions. Via- https://hubs.ly/H0lcv8M0 #100securedays
If you would like to speak to our security consultants on best practices to keep your business secure, please contact us to discuss your unique requirements.