Blog
TOP VULNERABILITY THIS WEEK – 08/02/2019 150 150 tiptechnologies_6agik4

TOP VULNERABILITY THIS WEEK – 08/02/2019

08/02/2019 TOP VULNERABILITY THIS WEEK: NetWire variants used in fake business spam campaign    

Cyber Security Statistics For Everyday People. Do You Know… tiptechnologies_6agik4

Cyber Security Statistics For Everyday People. Do You Know…

In 2017 we have seen more focus on cybersecurity investment from healthcare providers. They’ve felt the pain of their antiquated systems and have had to step up out of necessity to do more to protect their infrastructures and patient data.” –Robert Herjavec, Founder & CEO, Herjavec Group Do You Know… 91 Percent of attacks by…

How to create Fortigate SSL VPN tiptechnologies_6agik4

How to create Fortigate SSL VPN

How to create Fortigate SSL VPN SSL-VPN provides remote users with access to the corporate network using SSLVPN  client while connecting through the Internet to the corporate FortiGate unit. During the connecting phase, the FortiGate unit will also verify that the remote user’s antivirus software is installed and current… Step 1. Create an SSL VPN portal…

How to configure Wired 802.1x tiptechnologies_6agik4

How to configure Wired 802.1x

How to configure Wired 802.1x on ISE 1.3… 1. Add an external identity source e.g. AD If you have multiple identity sources, create an identity source sequence Add ISE(s) as join points to AD Add AD OUs as groups To enable machine authentication; go to Administration, external ID sources, Advance settings – Tick the check…

Types of DDoS Attacks – volumetric, asymmetric, computational, and vulnerability-based tiptechnologies_6agik4

Types of DDoS Attacks – volumetric, asymmetric, computational, and vulnerability-based

Soft side on Cyber Security DDoS attacks are rapidly evolving in frequency and unpredictability. While the objective is still to cause a service outage, attacks and attackers are becoming more sophisticated. While the threat landscape continues to expand, some security experts think that DDos fall within four major types: volumetric, asymmetric, computational, and vulnerability-based. Defensive…

Different types of firewall… tiptechnologies_6agik4

Different types of firewall…

Different types of firewalls… How it works Packet-Filtering Firewall – ACLs – IPs and Port numbers Operates at layer 3 and 4 Stateful Firewall – Operates at layer 5 Application/Proxy Firewall – Proxy for clients with security app like Websense, McAfee – Layer 7 FWs Reverse-Proxy Firewall – Proxy for server with security app like…