<img src="https://secure.leadforensics.com/71120.png" style="display:none;">

Kalki Blog

Header_about.png

DNS server misconfiguration may allow attackers access to internal network!

Posted by Kyle.Balicki on Apr 14, 2015 2:02:27 PM

If your business hosts a DNS (Domain Name Service) server, you may be at risk for attackers remotely connecting to your DNS server and gaining vital knowledge on your internal network structure, making attacks easier and more likely to occur. If not properly configured, your DNS server will respond to an attackers request for information about your internal network.

Read More

Topics: Security Credentials, Breach, Cyber security

CAN-SPAM: Standards for the Sending of Commercial Emails

Posted by Kyle.Balicki on Mar 5, 2015 12:42:04 PM

Does your business use email? The CAN-SPAM Act is a law that sets the rules for commercial email, gives the recipients the right to have you stop emailing them, establishes requirements for commercial messages, and issues tough penalties for violations.

Read More

Topics: Security Credentials, Human Resources, Policies and Procedures

Startup Security Companies To The Rescue

Posted by Kyle.Balicki on Jan 13, 2015 9:33:23 AM

In the past, the number one rule has always been “Don’t talk about security” or “Need to know basis regarding security”. Today, security is a mainstream topic that is taking over news headlines globally as technology becomes more and more advanced and data breaches and hacks are occurring more frequently. Security innovation has since become a mainstream focus and a strategic imperative for business. This is both good news and bad news for information security firms. The plus side, is that a companies C-suite finally understands why security innovation is an important factor. The negative side to this, they will now expect more of it from you. The question that is currently being asked, where do you begin? and what do you do?

Read More

Topics: Security Credentials, TechStartups, small business, Security technology, Cyber security, Policies and Procedures

Social Login Vulnerability Threatens The Web

Posted by Kyle.Balicki on Jan 8, 2015 8:42:44 AM

The holiday season is in full swing, which means consumers are taking to the internet to do their shopping for the holidays in an effort to avoid long lines and wild crowds at stores within the mall and other popular locations. They are also doing this because the internet often offers “cyber deals”, or products at a much lower price than in the store itself. Unfortunately, a new threat has been discovered in social login services that are provided by Amazon and LinkedIn. This threat, is known as “SpoofedMe”.

Read More

Topics: Security Credentials, Breach, identity theft, Cyber security

NIST unveils framework to strengthen cybersecurity

Posted by Vikas.Bhatia on Feb 13, 2014 6:22:15 PM

President Barack Obama issued Executive Order 13636 that calls for the strengthening of "Critical Infrastructure Cybersecurity" nearly a full year ago on Feb. 19, 2013. Yesterday, the National Institute of Standards and Technology announcingthe release of version 1 of a Cybersecurity Framework.

Read More

Topics: Security Credentials, Breach, Risk assessment, anti-malware, small business, Human Resources, Security technology, identity theft, Cyber security, Policies and Procedures

Don't become a "Target" of weak network security

Posted by Vikas.Bhatia on Feb 6, 2014 1:58:04 PM

How strong is your weakest link?

Read More

Topics: Security Credentials, Breach, small business, Security technology, Cyber security, Policies and Procedures

Have secure file transfer apps made FTP obsolete?

Posted by Kyle.Balicki on Jan 9, 2014 5:25:28 PM

The File Transfer Protocol is a standard network protocol that is used to move files from a client to a server. Today we generally know it if we have ever uploaded a web page to a hosting provider. The FTP protocol was written by Abhay Bhushan in April 1971, and the current version of the protocol dates back to September 1998. Today FTP is still used to transfer files between clients and servers. But the recent news about the British Broadcasting Co.’s server ftp.bbc.co.uk being compromised by a Russian hacker shows that FTP might be showing signs of being obsolete.

Read More

Topics: Security Credentials, Breach, small business, Security technology, identity theft, Cyber security, Policies and Procedures

Security For All the Bloggers: Two-Factor Authentication

Posted by Kyle.Balicki on Dec 23, 2013 2:30:04 PM

We know that writing a blog is fun, and you can get information out or just talk to a set group of interested people about a topic you like. This is great and gives all of us an equal platform for our opinions. Although there always seems to be one thing that we forget, and that is Information Security regarding our blogging material. We see a lot of exploits for Wordpress on a regular basis. We have seen 6 exploits just in this month for Wordpress and associated plugins.

Read More

Topics: Security Credentials, Risk assessment, small business, identity theft, Cyber security, Policies and Procedures

3 Easy Steps to Safer Computing

Posted by Stephen.Lawton on Nov 29, 2013 3:32:21 PM

3 Easy Steps to Safer Computing

Read More

Topics: Security Credentials, small business, Security technology, Cyber security

"De-nile" is not just a river in Egypt....

Posted by Vikas.Bhatia on Oct 28, 2013 6:19:30 PM

A former co-worker of mine once mused, "De-nile is not just a river in Egypt," in response to a client who stated that the security problem we had identified didn't matter to him, his manager or in fact, the organization. This was despite the company in question was paying my former employer vast sums of money so that they didn't have to employ those with the expertise, namely us, directly.

Read More

Topics: Security Credentials, Risk assessment, small business, Security technology, identity theft, Cyber security