Blog iconBlog

Carolina Advanced Digital, Inc. >

Iran Cyber-Response: 4 Recommendations for Defending Your Organization from Nation-State Attacks

While we offer services to review and assess firewall rules for security, if you have the resources in-house, organizations can tackle this by configuring rules to log (audit mode) temporarily and reviewing the to see which are being used. If it hasn’t already been done (and documented) further research should be done to review the in-use rules, identify the resources in play, and make sure there’s a business case documented for each policy or rule set.


Read More
email email email email email email email
profile iconPosted by Jennifer Minella

2020 Cybersecurity Predictions

Imagine this: The year is 2020. You sit down for dinner and notice your children’s eyes are glued to the device in front of them. Your partner calls out from the kitchen, “Alexa, what time is my hair appointment tomorrow?” Suddenly, your Bluetooth-enabled crockpot...
Read More
email email email email email email email
profile iconPosted by Jennifer Minella
getcomixxx.com