Can somebody explain a brute force attack from a Microsoft IP address? Websites are easy targets for various network attacks simply because they are available to the public. What protects a website from being “hacked” is a rather thin veneer of passwords, strengthened by a range of firewall measures. WordPress, a popular platform on which…
Tag: Microsoft
Documentation — The Key to Continuity
Documentation is what you ask for – don’t expect people to just do it. As a business owner or manager, it is your job to insist on it.
Out of Control? – Security Vulnerabilities in Control Systems
Control Systems. Are they possibly the biggest security vulnerability? By now almost everyone has seen the news media on the cyberattacks stemming from Russia. So far nothing dastardly has occurred at the same scale of the Colonial Pipeline fiasco in 2021. That event involved the deployment of ransomware across the corporate network. As a precaution,…
The Invisible Hand
And so it is today we have the ugly head of monopolistic power being raised and the cry for anti-trust lawsuits to be levied against Amazon, Google, Facebook and Twitter. Is it really necessary?