Satisnet Ltd, Basepoint Innovation Centre, 110 Butterfield Great Marlings, Luton, Bedfordshire, LU2 8DL enquiry@satisnet.co.uk
+44 (0) 1582 434320
Filter posts by solution, product or vendor

Protect against CryptoLocker Ransomware

Recently, attackers employing a CryptoLocker variant have been removing volume shadow copies on systems, disallowing the users from restoring those files and then encrypting the files for ransom. If a user cannot recover from backups, he/she is at the attacker’s mercy.

Read More

Effective Security Requires a Change in Mindest and the Protection Paradigm

If you were like most people, the news in 2015 kept getting worse and worse, when it came to yet another health care data breach that was discovered. Each time you thought that it couldn’t get much worse, it did. Now a massive health care data breach seems to be the norm. News reporters have been getting to the point of saying that breaking news would be when there is not some kind of major breach.

Read More

How to take control of the ransomware problem

When will we be finally rid of ransomware? I imagine CISOs up and down the land repeat the same question most every day. Because it’s on a near daily basis we hear of yet another new variant causing havoc around the world. Most recently, reports have focused on new strains being offered “as-a-service” for non-technical cybercriminals to disseminate, ensuring the outbreak has now reached epidemic proportions. The truth is that until all organisations start refusing to pay the ransom, and/or get better at security basics, there’ll always be enough profit to keep the black hats interested.

Read More

Is Mr.Robot in Your Network

In Season 2 Episode 6 of Mr. Robot, Darlene and Angela continue with infiltration of the FBI and E-Corp, while Elliot is otherwise detained. Because Angela must plant the femtocell in E-Corp, members of F-Society help her learn the commands that are needed. They also offer an alternative called a “Rubber Ducky,” a USB device that registers itself as a Human Interface Device (HID) or keyboard. Since all systems trust HIDs, they are able to bypass policies that don’t allow USB storage devices. However, the infiltration plan is executed as planned with the femtocell device.

Read More

Lessons in Code Recyling from Pokemon Go

As seen in the SD Times, good programmers write good code, but great programmers DO steal. And reuse. And recycle.

Read More

Vulnerability Management with Nessus in the Cloud

Regardless of whether you’re running applications and storing data in a physical, virtual or cloud environment (or a hybrid mix), a key responsibility for you as a security professional is to keep that environment free from vulnerabilities that attackers could use to get at your organisation’s applications and data.

Read More

Do you know your patch management posture?

How well do you know the security posture of your environment? Do you know how effective your Patch Management process is? Can you provide stakeholders with a quick look at the state of your network and show how protected you are in real time?

Read More

3 POS Security Recommendations Following the Oracle MICROS Breach

As first reported by Brian Krebs, “a Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp.” According to the report, “the attackers compromised a customer support portal for companies using Oracle’s MICROS point-of-sale credit card payment systems.” The breach comes…

Read More

QRadar Use Case Demo's

This blog post contains a very useful list of IBM QRadar Use Cases

Read More

Just What the doctor ordered: Trend Micro Takes The Hassle Out of Security For New CyberAid Program

When it comes to healthcare security, media attention is usually focused on the mega breaches – think Anthem, Premera and, most recently, Banner Health. But there is a long tail of smaller organizations who also need help. That’s where the Health Information Trust Alliance (HITRUST) has expanded its focus. Its latest initiative, CyberAid, is designed specifically to help smaller healthcare organizations protect themselves from ransomware, data breaches and other major threats.

Read More

Pages