Analecta Cyber Company Blog: October 2018

2018-10-16

Cryptographic Hashes: Verifying the Integrity of Your File System Baseline

MD5 and SHA Checksum Utility Graphic Cryptographic Hashes - Verifying the Integrity of Your File System Baseline - Analecta LLC banner Graphic We have discussed the importance of establishing a baseline for data flow across your network and the criticality of identifying abnormal activity before it wreaks havoc on your business systems. The National Institute of Standards and Technology (NIST) recommends IT cybersecurity teams use cryptographic hashes to detect unauthorized changes to software, firmware and information stored on your network.

2018-10-09

Carefully Testing your Antivirus Software on the Web

The site ahead contains malware graphic - Analecta LLC Carefully Testing your Antivirus Software on the Web - Analecta Banner Graphic
The roles of antivirus (AV) software and intrusion detection systems (IDS) are similar and straightforward - to detect malicious activity targeting your systems. NIST Cybersecurity Framework recommends that you test detection processes as a key function of security (akin to testing smoke alarms and fire extinguishers for proper functionality before they are needed). Here we discuss testing your antivirus and IDS to be sure they are functioning properly and protecting your networks.

2018-10-02

Detecting Malware Using a Centralized Antivirus Management System

Malware detected graphic - Analecta LLC detecting malware using a centralized antivirus management system - Analecta LLC banner graphic Previously we touched on the basics of what to do when your antivirus (AV) software indicates that it has found malicious code in the form of a virus, worm or trojan. This foundational knowledge should be seen as a starting point, especially if you own or support a small to medium sized business (SMB). As your business grows to a more complex network setup, you may face additional cyber threats in both quantity and their ability to do permanent damage to your information and your bottom line.