
IT Strategies for Your Business: Typosquatting
Users may be tricked into entering sensitive details into these fake sites. For organizations victimized by these attackers, these sites can do significant reputational damage. Typosquatting is a type of

What is the The Dark Web? Pt. 2
Dark websites look pretty much like any other site, but there are important differences. The biggest is the naming structure. Instead of ending in “.com” or “.org”, these sites often

What is Encryption?
People have always wanted to disguise or protect sensitive information from unintended eyes. In 1900 BC, Egyptian noblemen used a simple hieroglyphic substitution in the tomb of Khnumhotep, altering one

IT Strategies for Your Business: MitM Attacks
Let’s go back to the 20th century. You’re trying to have a private conversation with your high school crush on the phone when your younger sibling picks up the phone

IT Strategies for Your Business: DDoS Attacks
In September 2017, Google got hacked. Google’s cybersecurity team discovered that a hacker in China used several internet service providers (ISPs) to attack thousands of Google IP addresses. This attack on