by Platinum Technologies | Sep 20, 2023 | Network Segmentation, Security, Zero Trust
Network segmentation is one of the most important pillars of the zero-trust security model. It involves dividing a computer network into smaller subsegments that are independent of one another. This has the two-fold effect of improving network performance and...
by Platinum Technologies | Sep 19, 2023 | Zero Trust, Cybersecurity, Network Security, Security
In today’s modern technological world, it is no longer enough to just keep people out. Cybercriminals have a myriad of ways to access networks and systems, whether legitimate or not. And once they’re inside, they can cause a lot of damage. One of the newest and most...
by Platinum Technologies | Sep 6, 2023 | Cyberattack, Security, Spoofing
One of the most difficult types of cyberattacks to detect is a spoofing attack, which is an attack where the attacker pretends to be someone other than who they are. The goal is to gain the targeted victim’s trust and confidence so they can gain access to a...
by Platinum Technologies | Sep 5, 2023 | Identity Based Attack, Cybercrime, Security
Cybercriminals are becoming increasingly adept at using user identities to commit cybercrimes. A whopping 80% of breaches involve the use of compromised or stolen identities. These types of attacks are difficult to detect, making it critical that you understand what...
by Platinum Technologies | Aug 17, 2023 | Cyberattack, Cyberthreat, DoS Attack
Last week we discussed malware attacks and how to protect against them. This week, we will talk about another type of cyberattack—the Denial of Service or DoS attack. This is the type of attack a cybercriminal uses when they want to render a network, system, or device...