Blog Posts

Malicious Apps and How to Protect Your Data

Smart phones have been rising steadily in popularity, and are now used to access the internet more often than desktop computers. Android has become the most popular operating system in use worldwide. Hackers are aware of its popularity, of course, so naturally more...

RedLegg: Servicing Clients from the Beginning

Who we are, what we’ve been up to, and where we’re going Why ‘redleg’? The term “redleg” (one g) was coined during the American Civil War, and referred to the two-inch scarlet stripe that was sewn onto each pant leg of a Field Artillery soldier’s uniform. Artillery...

Hunting Down Phishing Sites

Rapid Reporting of Industry-Specific Threats Just how many phishing threats does your organization or industry face at any one time? What about daily and monthly identification, reporting, and steps for mitigation? The current threat landscape can be overwhelming:...

The Evolution of Drive-By Cyberattacks

Staying safe in the wireless world By: Intern Cassandra Knapp-Mason From Dial-Up to Wireless The early days of the internet, where dial-up connectivity was the norm, are gone for most users around the world. Even though some two million US users may still pay AOL for...

Perils of Password Reuse

In 2017 there were nearly 150 million user accounts exposed in security breaches, an astounding number! Research indicates that 99% of these compromised user accounts implemented password reuse, using the same password for other accounts elsewhere on the internet....

Securing Wireless Networks

This week, we want to talk about securing Wireless Networks. Wireless communications have become nearly ubiquitous, but despite the rapped growth of their acceptance, the knowledge to secure those networks has been greatly ignored. We still see many home networks...

Avoiding Phishing Emails!

This week we want to talk about avoiding phishing emails. Check your headers! Email headers give the extra information necessary to determine if the sender is who they claim to be. This knowledge can be the fastest way to know if you should click the link they sent...

Cybersecurity Decision Time

According to Cisco's 2015 Annual Security Report, 91% of companies employ an executive with direct responsibility for security, but only 29% of them employ a chief information security officer (CISO). Businesses with CISOs on staff recorded the highest level of...

Encryption

This week we want to talk a little about encryption. Implementing encryption can help keep data protected from the prying eyes of unauthorized parties, both in transit and at rest. Encryption is a hot topic these days, and it's important to note that with as many high...

Password Management

This week we would like to talk about password management. Compromised credentials are one of the biggest factors in lateral movement during a breach. It's important we're thinking about how we protect our passwords. Here are some tips to help you manage your...