Internetwork Technologies cs https://itnetcs.net CyberSecurity,CMMC,CyberAB,Cloud,ISO-27001 Fri, 08 Sep 2023 22:55:45 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.1 https://itnetcs.net/wp-content/uploads/2023/09/itnetcs_logo6-150x84.jpg Internetwork Technologies cs https://itnetcs.net 32 32 Endpoint Security https://itnetcs.net/endpoint-security/ https://itnetcs.net/endpoint-security/#respond Thu, 07 Sep 2023 21:45:05 +0000 https://itnetcs.net/?p=564 Endpoint Security Read More »

]]>

What is an endpoint?

An endpoint device is a computer, mobile or stationary, that uses a TCP/IP network to communicate with the internet. An endpoint device can be:

  • Laptops
  • Desktop computers
  • Mobile phones
  • POS devices
  • Internet of Things (IoT) devices, such as: Actuators, sensors (thermostats), security cameras, refrigerators, medical devices, smart meters, etc.

What is Endpoint Security?

Endpoint security is the practice of providing protection for endpoints or entry points of end-user devices that is part of a network, whether on premise or in the cloud, from infection and exploitation by sophisticated malware, ever evolving zero-day threats or advanced persistent threats(APTs).

Because endpoints are vulnerable points of entry for exploits and malware, they are primary targets of malicious actors. As such, endpoint security is often viewed as an organization’s frontline of defense against hackers, intentional and accidental insider threats and usually is of primary concern when securing an organization’s network.

Hackers are always devising new methods of breaching an organization’s security, tricking employees into providing access to personally identifiable information (PII) and the organization’s proprietary data that is then stolen and usually used for illegal purposes.

As a result endpoint security has evolved from traditional antivirus software to more sophisticated next-generation platforms employing advanced technology, such as AI, that provide more effective endpoint detection and response solutions.

Artificial Intelligence (AI) within endpoint security

Artificial Intelligence (AI) within endpoint security is advanced technology that combined with machine learning is able to detect threats in real-time and provide effective protection for endpoints. 

AI threat intelligence solutions gather data from sources such as social media and open-source security databases. Using machine learning algorithms it learns to recognize patterns and predict potential threats by analyzing past and present data. AI threat intelligence solutions enables the EDR to quickly identify zero-day threats because the collection of data and resulting communications are performed in real-time and is shared immediately with providers of security tools that guard against emerging threats.     

Antivirus vs. Endpoint protection

Traditional Antivirus (AV) software is installed on endpoint devices such as desktops, laptops, tablets, smart-phones etc. It routinely scans files and emails on the endpoint devices for malware in the form of virus payloads. If an anomaly is detected a comparison is performed using its virus signature and definitions database to determine if executable malicious codes exist within the virus payloads . If a match is found, the antivirus software quarantines or blocks the infected files.

Today’s Endpoint Detection and Response (EDR) solutions, incorporates Antivirus capabilities in combination with firewall functions, anti-malware, Virtual Private Network (VPN) that offer data encryption and Data Loss Prevention (DLP) technologies. Some EDR also comes equipped with a dashboard that provides logging and alerting capabilities for an enhanced view of the endpoint security landscape in real-time.

What is Malware

Malware, or malicious software, is a general description of any type of computer software with malicious intent. Malware infection is the leading cause of security breaches, often leading to ransomware attacks, theft or destruction of data that usually results in lost revenue and in some cases damage to the organization’s reputation or brand. 

Traditional antivirus software does not offer a defense against malware, ransomware or spyware. However, most next generation Antivirus (NGAV) solutions include additional security features such as malware and ransomware protection.

 

 

]]>
https://itnetcs.net/endpoint-security/feed/ 0
Types of Password Managers https://itnetcs.net/types-of-password-managers/ https://itnetcs.net/types-of-password-managers/#respond Wed, 06 Sep 2023 22:50:07 +0000 https://itnetcs.net/?p=549 Types of Password Managers Read More »

]]>

CLOUD PASSWORD MANAGERS

are currently the most popular choices for businesses and individuals.  The cloud password manager service stores and encrypts the passwords within the cloud.

The primary benefit of using a cloud password-manager is that it allows the user access from anywhere as long as they have access to Internet Service.

MOBILE PASSWORD MANAGERS

There are many cloud based password manager apps that are available for mobile android and iOS computing platforms, but there also proprietary password managers such as Apple’s Keychain and Google’s Password-Manager.  These devices also provide the option to auto-fill passwords across mobile applications and websites.

BROWSER-BASED PASSWORD MANAGERS

Browser services such as Firefox, Chrome, Safari and Edge offers built-in password-managers.  Users that make use of these built-in password-managers can sync their passwords across devices that supports these browsers.

Password Management Best Practices

The following are some recommended password management best practices:

Never Reuse Passwords, i.e.; never use the same passwords across multiple accounts

Use long passphrases: The longer your password, the longer it will take to crack. You should use randomly generated passwords (password-manager) or passphrases that you will remember.

Pay attention to the strength of your password; you should use password strength detection tools to measure the strength of your password before using it.  Many sites now offer indicators that tell you how strong or how weak your password is when it is being created.

Most sites today offer multifactor authentication (MFA): they use of MFA makes it extremely difficult for someone to access your account without your permission.  It also serves as a means of notifying you if someone tries to access your account especially without your permission. 

Once Multi-factor authentication is enabled on your account to access your account you will need to not only enter a username and password but you will usually be provided with a pin that will be sent to your phone or some device that to designate. That pin will then need to be entered into the site to complete the authentication process so you can get access to your account.

CLOUD PASSWORD MANAGERS

Cloud password managers are currently the most popular choices for businesses and individuals.  The cloud password manager service stores and encrypts the passwords within the cloud.

The primary benefit of using a clout password-manager is that it allows the user access from anywhere as long as they have access to Internet Service.

MOBILE PASSWORD MANAGERS

There are many cloud based password manager apps that are available for mobile android and iOS computing platforms, but there also proprietary password managers such as Apple’s Keychain and Google’s Password-Manager.  These devices also provide the option two auto-fill passwords across mobile applications and websites.

BROWSER-BASED PASSWORD MANAGERS

Browser services such as Firefox, Chrome, Safari and Edge offers built-in password-managers.  Users that make use of these built-in password-managers can sync their passwords across devices that supports these browsers.

Password Management Best Practices

The following are some recommended password management best practices:

Never Reuse Passwords, i.e.; never use the same passwords across multiple accounts

Use long passphrases: The longer your password, the longer it will take to crack. You should use randomly generated passwords (password-manager) or passphrases that you will remember.

Pay attention to the strength of your password; you should use password strength detection tools to measure the strength of your password before using it.  Many sites now offer indicators that tell you how strong or how weak your password is when it is being created.

Most sites today offer multifactor authentication (MFA): they use of MFA makes it extremely difficult for someone to access your account without your permission.  It also serves as a means of notifying you if someone tries to access your account especially without your permission. 

Once Multi-factor authentication is enabled on your account to access your account you will need to not only enter a username and password but you will usually be provided with a pin that will be sent to your phone or some device that to designate. That pin will then need to be entered into the site to complete the authentication process so you can get access to your account.

]]>
https://itnetcs.net/types-of-password-managers/feed/ 0
Are Password Managers Safe, Are They Secure https://itnetcs.net/are-password-managers-safe-are-they-secure/ https://itnetcs.net/are-password-managers-safe-are-they-secure/#respond Wed, 06 Sep 2023 22:46:51 +0000 https://itnetcs.net/?p=559 Are Password Managers Safe, Are They Secure Read More »

]]>

Password managers are generally regarded as relatively safe, but are they secure ?.  

Many in the information security domain would argue that it’s more risky to rely on writing down the password or simply committing it to memory than using a password manager.

This due to the fact that password managers offer encrypted solutions for creating and storing strong passwords that help keep your data more secure. They provide you with useful tools that are usually designed around best practices for password management.  

This makes it easy for the user to develop and use good password management practices, while changing bad password management habits such as using no password all, or using something like “12345”, or storing your password underneath your keyboard or the worst yet leaving it taped to your computer screen.

PASSWORD MANAGER ENCRYPTION

All password managers secure your data using some type of encryption algorithm.

One of the most popular encryption algorithm is the (AES 256) Advanced Encryption Standard 256. (AES) 256 is a virtually unbreakable symmetric encryption algorithm that uses a 256-bit key to convert your plain text or data into a cipher.  

No matter which encryption standard is used, the basic encryption process is still the same; that is, using a mathematical formula to scramble and unscramble your information so only you, the person with the key or password will gain access to the data. 

WHAT IS A CIPHER

Ciphers, also called encryption algorithms, are systems for encrypting and decrypting data. A cipher converts the original message, called plaintext, into ciphertext, “a random string of characters”.

HOW DO PASSWORD MANAGERS WORK

Password managers provide the user with a secure space to store and retrieve their passwords.

When you’re using a password-manager and you need to access your account, you simply enter the master password into the password-manager.  The password-manager then makes the password for the account you’re trying to access available so it can be copied and pasted, or typed into where it’s needed so the user can gain access to that account.

Some password managers support biometric authentication such as swiping with your finger, multifactor authentication using a pin provided by apps such as Google authenticator, or a device such as RSA-secureid for added layers of security.

Biometric authentication allow the user access to their data while denying hacking devices such as key-loggers the ability to capture your keystrokes as you type in your password.

Multi-factor to authentication requires the user to provide two types of identification before they can gain access to their account.  This is usually in the form of a password and a pin.

The RSA-secureid device is a purpose built device that provides a pin, similar to Google’s authenticator, as part of the Multi-factor authentication process.  The difference between the two is that Google’s authenticator is free and RSA-secureid is not.

 

]]>
https://itnetcs.net/are-password-managers-safe-are-they-secure/feed/ 0
Securing Your Home Network https://itnetcs.net/securing-your-home-network/ https://itnetcs.net/securing-your-home-network/#comments Wed, 06 Sep 2023 20:17:30 +0000 https://itnetcs.net/?p=561 Securing Your Home Network Read More »

]]>

WIRELESS FIDELITY or "Wi-Fi Network"

is the primary means of accessing the internet and sharing devices in most homes today.

Wi-Fi in the home usually involves a wireless device such as a router that sends a signal through the air; your phone, tablet, computer etc, connects to the signal and use it to access the internet.

However, if the wireless signal is not properly protected, anyone using a device that detects the signal can then connect to it and use it.

If that person(s) then use your wireless connection to perform an illegal act, like hacking someone’s network or sending illegal spam emails, their activity can be traced back to your network.

In addition to using your wireless network illegally, they could also see and capture your personal information which could potentially lead to identity theft. 

SECURING YOUR HOME Wi-Fi NETWORK

To protect your “Wi-Fi network”, ensure your personal or ISP-provided router is capable of “Wi-Fi Protected Access-3” (WPA3).

As of this posting, WPA3 is the newest wireless encryption standard available.

Wi-Fi routers will usually support older security standards, so if you have devices on your network that does not support WPA3, you can select WPA2 or WAP2/3 if that option is available.

This allows the newer devices to make use of the WPA3 security standard while still allowing older devices to connect to the network using WPA2.

If you are planning to purchase a new device, ensure it is at a minimum WPA3-Personal certified. 

ROUTER ADMINISTRATION

Out of the box from the manufacturer, the majority of the routing devices are generally configured to allow the user to just plug it into the home ISP-Internet connection and immediately gain access to the internet.

There are however two settings that you will need to change:

  1. The router admin password: This password allows you to perform administrative functions on the router, such as changing the Wi-Fi network password.
  2. The Wi-Fi network password: This password allows devices that detects your wireless signal to connect to your network.

It is a highly recommended best practice to limit administration of your devices to your internal network only.

This way, no one on the outside of your network will be able to make changes remotely to your network. Most of the routers are configured from the factory to deny remote administration, so you should leave it that way.

The router should be updated regularly with the latest version of the available software.

You should visit the router manufacturer’s site regularly to see if a newer version is available and download and install it.

 
 
]]>
https://itnetcs.net/securing-your-home-network/feed/ 1
Securing Your Accounts https://itnetcs.net/securing-your-accounts/ https://itnetcs.net/securing-your-accounts/#respond Wed, 06 Sep 2023 19:59:34 +0000 https://itnetcs.net/?p=560 Securing Your Accounts Read More »

]]>

Protecting your devices is just the first step in protecting your personal information. Once your Desktop,Laptop, tablet, or phone are secure, you need to take steps to protect your accounts. This could be bank, email, social media etc.

PASSWORDS

When accessing your accounts you should use a password, that is at least (12) characters in length, and at a minimum is made up of numbers and letters.

If the security application allows it, you should also include special characters such as ” #&^!*$ “; for example “Thi5is4test#”. The longer the password, the more difficult it is for someone to break it.

To generate your password, consider using a “passphrase”, something you will easily remember, and inserting numbers and special characters, avoid using common words or phrases.

MULTI-FACTOR AUTHENTICATION

Many online accounts now offer extra security by requiring two or more credentials before you are granted access to your accounts; this is called multi-factor authentication.

The additional security step, can require you to authenticate using a security key or using an app such as google authenticator that provides a 6-digit pin. You should backup your files, just in case your device gets infected or it’s hacked and you are unable to get access to or recover your files.

Once per week is the recommended period for backing up your files; so remember, if you need to restore your files, it will only be current up to the last time you backed it up.

]]>
https://itnetcs.net/securing-your-accounts/feed/ 0
Artificial Intelligence (AI) https://itnetcs.net/what-does-a-travel-guide-do-how-to-become-a-travel-guide/ https://itnetcs.net/what-does-a-travel-guide-do-how-to-become-a-travel-guide/#respond Sun, 03 Sep 2023 18:58:43 +0000 https://itnetcs.net/?p=565 Artificial Intelligence (AI) Read More »

]]>

Artificial intelligence (AI) is technology that mimics human cognitive capacity in some form. It essentially gives machines and software (computers), the ability to comprehend text and spoken words in much the same way as humans recognize, respond and adapt to recognizable patterns in real time. As a still developing and expanding field AI has many applications and branches. Specific application of AI include among others, expert systems, natural language processing, speech recognition and machine vision.

Today AI as a fundamental application can be found in many industries that incorporate its Natural language processing (NLP); Industries such as automotive, finance, real estate, gaming, healthcare, speech recognition, Energy, Telecomm, Public Safety etc.

In these industries AI tools are being used to collect and analyze customer data, providing valuable insights for improving customer service and support.

There are many different branches to AI, some of the branches of AI are:

Machine Learning – leverages available data to improve the performance of computers by giving them the ability to “learn”, almost like humans.

Reinforcement Learning – Algorithms that allows machines to learn from trial and error, and then using the feedback to perform actions.

Deep Learning – a subcategory of machine learning that uses neural networks to perform complex tasks. It provides the ability for machines to perform human-like tasks without human involvement.

Expert Systems – a program that specializes in a singular task, and is able to emulate the decision-making capability of a human expert or specialist. These systems are designed to provide solutions to complex problems by applying if-then-else rules that allows it to reason through vast quantities of data, again, in an almost human like manner.

Computer Vision – similar in application to giving sight to a human, it enables machines to acquire, interpret, process, analyze and understand digital images and patterns in the visual world similar to humans.

Unsupervised Learning – algorithms that learn patterns from unlabeled data where there are no targeted results, and arriving at meaningful conclusions by analyzing datasets.

Intelligence – there are several types of intelligence which include:

  1. Artificial Narrow Intelligence (ANI) – typically performs a single or narrow set of related tasks at a high level of proficiency.
  2. Artificial General Intelligence (AGI) – an advanced form of AI with human like abilities that can rationalize situations, understand abstract concepts and carry out highly complicated tasks without human intervention.
  3. Artificial Super Intelligence – AI that surpasses human capabilities

Sentiment Analysis – an algorithm typically used with social media platforms to analyze and extract emotions and attitudes about products from texts.

Natural Language Processing – enables computers to read and understand both text and spoken words similar to a human.

Artificial neural network – a type of machine learning algorithm incorporating human like cognitive reasoning capabilities that allows it to function similar to the neural network in the human brain.

Data Mining – discovers and extracts information and patterns using large data sets to find trends and relevant data.

Business Intelligence –analyzing data in order to gather insight into business and market trends.

Fuzzy Logic – a form of logic used to resolve issues or statements based on “degrees of truth”. It is usually employed in situations, where the truth value may range from completely true to completely false.

Speech Recognition – uses machine learning and neural networks to convert audio data (“spoken language”) into text.

Theory of Mind – regarded as the next level of AI; “theory of the mind” allows machines to be aware of and explain the consequences of their actions.  This will as a result, also allow them to adjust their behavior much like humans during social interactions.

]]>
https://itnetcs.net/what-does-a-travel-guide-do-how-to-become-a-travel-guide/feed/ 0
Deep Fakes https://itnetcs.net/deep-fakes/ https://itnetcs.net/deep-fakes/#respond Sun, 03 Sep 2023 18:58:34 +0000 https://itnetcs.net/?p=562 Deep Fakes Read More »

]]>


As AI-generated deepfake audio and videos become more prevalent and realistic, should we be worried?

some see these deepfake videos and voice clones as a form of entertainment, while cyber-criminals simply see opportunities.

What is a deepfake?

Deepfakes, are realistic imitations that use a form of artificial intelligence called deep learning to create realistic looking images of fake events, hence the name deepfake.

Deep learning enables computers to mimic human behavior; learning from interacting with its environment, like a child would. Deep learning is one of the core technologies behind driverless cars and virtual Assistants like Alexa, Siri and Google Assistant. Companies across various industries are making use of deep learning to provide personalized experiences for their customers.

]]>
https://itnetcs.net/deep-fakes/feed/ 0
Protecting Your Personal Information https://itnetcs.net/protecting-your-personal-information/ https://itnetcs.net/protecting-your-personal-information/#respond Sun, 03 Sep 2023 18:57:38 +0000 https://itnetcs.net/?p=563 Protecting Your Personal Information Read More »

]]>

Your Antivirus or firewall programs

must be up to date to work effectively, whether they came pre-loaded or you loaded them onto your phone, tablet, laptop, etc. yourself.

Operating system software

, This could be Windows 8, 10, 11, Apple macOS, Google ChromeOS or Android, for example.

Internet browsers and apps:


This could be Microsoft Edge, Mozilla Firefox, Apple Safari, etc.
Whether you purchased the security software or it came preloaded, the companies that created the software and made it available, often provide updates to address security issues, fix bugs or add new features. If you don’t regularly update the software you will not have protection from the latest threat that may affect that software.

]]>
https://itnetcs.net/protecting-your-personal-information/feed/ 0