Comments for RonanTheWriter https://ronanthewriter.com Freelance Blog Writer | Cyber Security Content Writer | Ireland Fri, 28 Aug 2020 10:11:38 +0000 hourly 1 https://wordpress.org/?v=6.5 Comment on Explaining What an APT is in Cybersecurity by Word Macro Virus Example - You'll Be Shocked How Easy It Is https://ronanthewriter.com/what-is-an-apt/#comment-94 Fri, 28 Aug 2020 10:11:38 +0000 https://ronanthewriter.com/?p=974#comment-94 […] this article. It could be code that when executed, establishes the initial compromise as part of an advanced persistent threat. I’m not concerned about technical code details: the most important part of getting a […]

]]>
Comment on Twitter Security Breach 2020: A Successful Social Engineering Attack by What is an APT (Advanced Persistent Threat)? - RonanTheWriter https://ronanthewriter.com/twitter-2020-breach-social-engineering-attacks/#comment-92 Thu, 27 Aug 2020 19:14:48 +0000 https://ronanthewriter.com/?p=877#comment-92 […] compromise: A malicious party targets a corporate network, usually via precise social engineering, and establishes a foothold in the network with appropriate technological assistance, such as a […]

]]>
Comment on A Guide to the Main 6 Types of Computer Viruses by What is Ethical Hacking? Our Article Answers This and More. https://ronanthewriter.com/types-of-computer-viruses/#comment-82 Sun, 23 Aug 2020 09:04:30 +0000 http://ronanthewriter.com/?p=776#comment-82 […] These people break into systems with the intention to destroy data, obtain lucrative information, spread computer viruses, or simply wreak […]

]]>
Comment on An IT Department’s Guide to Monitoring the Cloud by An Overview of Orchestration in Cloud Computing - RonanTheWriter https://ronanthewriter.com/monitoring-the-cloud/#comment-77 Thu, 13 Aug 2020 09:18:12 +0000 https://ronanthewriter.com/?p=914#comment-77 […] on their own. Orchestration provides a unified view of cloud resources, which facilitates better monitoring. The result is increased control of your cloud environment and improved implementation of IT […]

]]>
Comment on Security Attacks in Cryptography: Six Different Types by 5 Applications of Cryptography in Daily Life - RonanTheWriter https://ronanthewriter.com/types-of-security-attacks-in-cryptography/#comment-65 Sat, 08 Aug 2020 12:03:15 +0000 http://ronanthewriter.com/?p=728#comment-65 […] Cyber attacks on cryptography can happen, and this article does not suggest cryptography is foolproof. However, attacks that seek to exploit cryptography are far more complex to carry out than taking advantage of organizations that neglect to use an effective encryption strategy. Bear these important applications of cryptography in mind the next time your IT security team badgers you about an incomplete encryption strategy at your organization. […]

]]>
Comment on Security Attacks in Cryptography: Six Different Types by 6 Types of Computer Viruses and What They Do - RonanTheWriter https://ronanthewriter.com/types-of-security-attacks-in-cryptography/#comment-64 Sat, 08 Aug 2020 11:59:31 +0000 http://ronanthewriter.com/?p=728#comment-64 […] its ability to change itself into different forms to avoid detection. Polymorphic viruses often use cryptography methods to encrypt themselves and evade detection by antivirus software scanners. This is known as […]

]]>
Comment on Cloud Security Tips for Businesses by 3 Main Cloud Storage Types for Your Organization's Data https://ronanthewriter.com/cloud-security-tips-for-businesses/#comment-63 Sat, 08 Aug 2020 11:57:10 +0000 http://ronanthewriter.com/?p=693#comment-63 […] Is the data encrypted? (see tips on cloud security for businesses) […]

]]>
Comment on Security Attacks in Cryptography: Six Different Types by 5 Security Risks to Database Systems - RonanTheWriter https://ronanthewriter.com/types-of-security-attacks-in-cryptography/#comment-62 Sat, 08 Aug 2020 11:55:25 +0000 http://ronanthewriter.com/?p=728#comment-62 […] of exploits on database systems arise due to organizations not encrypting sensitive data. While attacks targeting encrypted data do occur, they require far more sophistication than simply accessing unencrypted data. This […]

]]>
Comment on Security Attacks in Cryptography: Six Different Types by 5 Options for Businesses Connecting to The Cloud - RonanTheWriter https://ronanthewriter.com/types-of-security-attacks-in-cryptography/#comment-61 Sat, 08 Aug 2020 11:52:30 +0000 http://ronanthewriter.com/?p=728#comment-61 […] worth remembering that attacks on cryptographic algorithms do happen. With a VPN, it is much more difficult to carry out sophisticated encryption attacks by […]

]]>
Comment on An IT Department’s Guide to Monitoring the Cloud by Synchronous vs Asynchronous Replication in Cloud Computing - RonanTheWriter https://ronanthewriter.com/monitoring-the-cloud/#comment-50 Wed, 05 Aug 2020 13:20:47 +0000 https://ronanthewriter.com/?p=914#comment-50 […] always remember to monitor your cloud usage, making sure that data is actually being replicated how you want it to […]

]]>