Attacked by Trojan.Emotet
We’ve just recovered from one of the most intrusive viruses to date with minimal damage to the client’s network. It’s been two days since the incident and with the client’s network up and running as usual, I’ve found some time to write a post about it. I’ll go over what the virus is, how it affected the network, and what we did to contain and then eliminate the threat, as well as prevention measures. It started with a firewall detection of a suspicious file being downloaded t

West Coast Partner Summit – Destination Tomorrow
We attended the Sandler Partners Summit this past Tuesday, October 16th. It holds great information for the people in the IT and Sales worl
Types of Attack Vectors
Cyber-criminals use different types of attack vectors
and malware to compromise networks. The five most
typical types are viruses, worms, Trojans, spyware and
ransomware.
Computer viruses were originally spread through the
sharing of infected floppy disks. As technology evolved,
so too did the distribution method. Today, viruses are
commonly spread through file sharing, web downloads
and email attachments.
Computer worms have existed since the late 1980s but
were no
DPI-SSL -SonicWall Deep Packet Inspection of SSL/TLS Encrypted Traffic
One of the recent project required to setup DPI-SSL for the network. Customer need to block part of the URL on the link. normally content filter can block the domain or categories of the website, however what if you need to block part of the sensitive url? ex: www.domain.com is ok to access, but block, www.domain.com/download? Well DPI-SSL will allow you to block that specific URL. In addition, you want to allow yourself but block your staff? no problem, we can setup exclusio