↓
 

Cybercon Services Knowledge Log

Strategic Business Technology Solutions

  • Home
  • Content
  • Forum
  • Privacy Policy
  • Services
    • ERP Support
    • Self-Service Reporting and Automation
    • SQL Database Support
    • Virtual CIO Program
    • WordPress Support
  • About
Home→Categories Security 1 2 >>

Category Archives: Security

Post navigation

← Older posts

Protect enterprise solutions with new Microsoft Power Platform security features

Cybercon Services Knowledge Log Posted on August 23, 2024 by Rick BackusAugust 19, 2024

By Nirav Shah – Many organizations feel  the urgency and pressure to protect against increasingly sophisticated attacks. At the same time, these organizations are being propelled into the age of AI with employees that are eager to use AI to build apps … Continue reading →

Posted in Power Platform, Security | Tagged Power Platform, Security | Leave a reply

Hackers are carrying out ransomware experiments in developing countries

Cybercon Services Knowledge Log Posted on April 29, 2024 by Rick BackusApril 26, 2024
High resolution imAGE of hacker group picking an african country on A MAP with a dart.

By ELLESHEVA KISSIN – Cyber attackers are experimenting with their latest ransomware on businesses in Africa, Asia, and South America before targeting richer countries that have more sophisticated security methods. Hackers have adopted a “strategy” of infiltrating systems in the developing … Continue reading →

Posted in Cybersecurity, Cybersecurity, Ransomware | Tagged Cybersecurity; Ransomware | Leave a reply

18,000 User Credentials Offered on Dark Web After AnyDesk Confirms Incident

Cybercon Services Knowledge Log Posted on February 8, 2024 by Rick BackusFebruary 8, 2024
High resolution image of a computer monitor being struck with an axe by a masked person , blue liquid is oozing from the monitor with a soft, glowing green background

Last week, AnyDesk confirmed it was breached in a cyber-attack that wasn’t a ransomware incident. The hackers compromised the remote desktop-sharing software provider’s production systems. They could also access the source code and private code signing keys, according to Bleeping … Continue reading →

Posted in Hack, Ransomware, Security | Tagged Hack, Ransomware, Security | Leave a reply

Streamlining Application Integration: Modern Authentication for SharePoint

Cybercon Services Knowledge Log Posted on February 6, 2024 by Rick BackusFebruary 4, 2024
high resolution picture of modern warriors in armor battling digital creatures with blue and red glow in the background.

Streamlining Application Integration: Modern Authentication for SharePoint

Continue reading →
Posted in 2FA, Modern Authentication, SharePoint | Tagged 2FA, Modern Authentication, SharePoint | Leave a reply

Securing Your WordPress Site: A Comprehensive Guide to Implementing Duo

Cybercon Services Knowledge Log Posted on February 5, 2024 by Rick BackusFebruary 4, 2024

Securing Your WordPress Site: Implementing Duo for Enhanced Protection

Continue reading →
Posted in 2FA, Security | Tagged 2FA, Security | Leave a reply

Solving 2FA Interference in SharePoint Online PowerShell Scripts

Cybercon Services Knowledge Log Posted on January 17, 2024 by Rick BackusJanuary 13, 2024
Computer screen with powershell scripting on it. A small, flashing red message say "Access denied". The icon for Microsoft SharePoint is above the screen.

Addressing Two-Factor Authentication Interruption in SharePoint Online PowerShell Scripts.

Continue reading →
Posted in 2FA, PowerShell, SharePoint Online | Tagged 2FA, PowerShell, SharePoint Online | Leave a reply

Software Must Be Secure by Design, and Artificial Intelligence Is No Exception

Cybercon Services Knowledge Log Posted on August 24, 2023 by Rick BackusAugust 23, 2023

Secure by Design “means that technology products are built in a way that reasonably protects against malicious cyber actors successfully gaining access to devices, data, and connected infrastructure.”

Continue reading →
Posted in AI, Security | Tagged AI, Security | Leave a reply

Making the case for security operation automation

Cybercon Services Knowledge Log Posted on November 9, 2022 by Rick BackusNovember 9, 2022

By Jon Oltsik – According to ESG research, 52% of organizations believe that security operations are more difficult today than they were two years ago, due to factors such as the dangerous threat landscape, growing attack surface, and the volume/complexity of security … Continue reading →

Posted in Security | Tagged Security | Leave a reply

How to visualise security and threat information in Microsoft Power BI

Cybercon Services Knowledge Log Posted on January 4, 2022 by Rick BackusJanuary 4, 2022

The ability to compile and visualize data from multiple sources is not anything new. As the article mentions Excel has been doing it for years including charting. The self-service aspect of Power BI and it’s broad spectrum of integration sources … Continue reading →

Posted in Power BI, Security | Tagged Power BI, Security | Leave a reply

The IoT is getting a lot bigger, but security is still getting left behin

Cybercon Services Knowledge Log Posted on November 18, 2021 by Rick BackusNovember 18, 2021

By Danny Palmer – Four out of five Internet of Things (IoT) device manufacturers are failing basic cybersecurity practices by not providing a way for people to disclose security vulnerabilities in their products – something that can potentially put users of the device at … Continue reading →

Posted in IoT, Security | Tagged IoT, Security | Leave a reply

Post navigation

← Older posts

Recent Posts

  • AI can spontaneously develop human-like communication, study finds
  • Making Tech Talk Make Sense
  • How the US Public and AI Experts View Artificial Intelligence
  • Is “OS Approach” the answer to enhancing Legacy Systems & Process Automation
  • Future of Workflow Automation: AI Integration Changing the Rules

Recent Comments

  1. Rick on Boeing confirms cyberattack amid LockBit ransomware claims
  2. Rick Backus on Securing the Internet of Things Requires Flexibility, Experts Say

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
©2025 - Cybercon Services Knowledge Log Privacy Policy
↑