Secure Talk

Tips, Tricks, and Techniques to Keep Your Cyber Assets Safe!

  In our last post, we looked at the increased incidents of cryptojacking and what were the factors behind the increase. We are now going to look at the detection and prevention of cryptojacking attacks. The number one sign that your device has been cyptojacked is a sudden unexplained degradation of performance.  You...

Nature, and apparently cyberspace, both abhor a vacuum. Thus, while the number of ransomware attacks have dropped significantly in 2017*, there’s a new “kid” on the cybersecurity block, and that kid’s name is cryptojacking. What’s cryptojacking? Cryptojacking is the unauthorized use of someone’s computing device to mine cryptocurrency. And, according to a...

[caption id="attachment_1278" align="alignleft" width="300"] Hiram Machado Discusses GDPR and Data Protection[/caption] On Thursday, April 19th adaQuest’s Hiram Machado, Paul Johnson, and Mark Shriner participated in the ISSA Puget Sound monthly chapter meeting. After watching an informative  presentation from Chapter President Justin White that covered some of the recent data privacy issues in...

[caption id="attachment_1269" align="alignleft" width="300"] Team adaQuest at the Microsoft Cybercrime Center[/caption]               Recently several members of the adaQuest team were invited by Microsoft to tour Microsoft’s Cyber Defense Operations Center (CDOC) and the Microsoft Cybercrime Center (MCC). While we were only allowed to enter and view a limited area of both the CDOC...

            So, OK, you are responsible for your organization’s IT security. Where should you start? Data protection, device detection, patches, passwords, GDPR, HIPPA, compliance vs. business requirements? It can all be a bit overwhelming.   At adaQuest we help companies understand their current IT security posture, see how it aligns with business...