Man-in-the-Middle Attacks: Protect Yourself from Network Traffic Hijacking

Man-in-the-Middle Attacks: Protect Yourself from Network Traffic Hijacking

According to net-monitoring firm Renesys, there’s been evidence of mass hijackings of network traffic recently discovered. Since the beginning of 2013, the firm has discovered live man-in-the-middle hijacks involving over 1,500 sets of IP addresses. A man-in-the-middle attack is an exploit that occurs when an attacker intercepts communications between two parties, often a website and...

avatar
Duleep Pillai
November 26, 2013
Discover More
Man-in-the-Middle Attacks: Protect Yourself from Network Traffic Hijacking

Simple Security Tips to Avoid Malicious Attacks

Malicious attacks, such as spyware, ransomware, and viruses, are designed to disrupt or damage a computer system. Often, malware is installed onto your computer through an infected email attachment, infected file on the Internet, or malicious website. Fortunately, malware can be prevented by following these security tips: Avoid Links within Pop-Up Windows Most pop-up windows...

avatar
Duleep Pillai
November 26, 2013
Discover More
Man-in-the-Middle Attacks: Protect Yourself from Network Traffic Hijacking

Is Your Business Saving Money By Cutting Back on IT Support?

In today’s world of cheaper airfares with hidden fees, and companies cutting corners just to remain cash-flow positive, it is not surprising that many business owners and executives think that cutting costs for IT will help them save money.  The opposite is actually true.  Businesses that invest in quality IT services and support actually reduce...

avatar
Duleep Pillai
November 22, 2013
Discover More
Man-in-the-Middle Attacks: Protect Yourself from Network Traffic Hijacking

How Does Encrypted Google Searches Impact Your Business SEO Rankings?

Google has managed to become a secure search engine over the past few months. In fact, Google encrypts all search data, which means website owners are denied access to keyword data that drives organic traffic towards their website. In order to access keyword data, website owners are required to run a paid AdWords campaign. Recently,...

avatar
Duleep Pillai
November 19, 2013
Discover More
Man-in-the-Middle Attacks: Protect Yourself from Network Traffic Hijacking

How To Reduce Your Energy Consumption, and Save Money

Most organizations are aware of how much energy their IT infrastructure consumes, but there are a few not-so-obvious ways to save energy, cut costs, and reduce your overall carbon footprint. Switch to Flat-Panel Monitors Using flat-panel monitors over CRT (cathode-ray tube) monitors can significantly reduce energy costs.  Georgetown University’s IT Department replaced its CRT monitors...

avatar
Duleep Pillai
November 18, 2013
Discover More