DON’T GET HACKED: Cost-Free Solutions To Prevent Cyber Crime – Merit Network

Cyber threats are on the rise – putting businesses, dollars and real lives in grave danger. Regardless of an organization’s size, most companies deal with securing personal information, computer networks and connected devices to conduct daily operations. As cyber attacks grow in frequency and sophistication, associated costs to mitigate these attacks skyrocket. According to Gartner, the worldwide security market reached $75 billion in 2015. This spending is expected to

Read More

Today is “World Password Day.”

Today is “World Password Day.”

In case you hadn’t heard, today is “World Password Day.” This would be a good time to go out and change your passwords. Need help on picking a new password? Head out to https://passwordday.org/ where Betty White provides best practices for cybersecurity. If you do not think Betty provided everything you need, head over to XKCD where they have one of the best comics around for choosing a secure

Read More

Your Digital Identity

Your Digital Identity

Identity. Comprised of everything associated with your physical being: height, weight, hairstyle and color, voice, even where you live. You do everything in your power to protect this identity. From exercising and eating right, using alarm systems to purchasing insurance. Your physical identity has always been the way for others to validate your existence. But what about your other identity? Your online identity. Cybercriminals and others can often find

Read More

Protecting Your Online Identity

Have you had your online identity stolen? Had your Twitter or Facebook account compromised? Do you use the same username and password across multiple sites on the Internet? Every day, hackers are exposing weak security practices of not only company websites but also attacking online identities putting you at risk. Having to remember multiple credentials which can require separate usernames, separate passwords, and the websites used for those credentials

Read More

Creating a Blackhole DNS with Bind 9

​Malware can be delivered many different ways from either advertisements (remember the NY Times malicous ads?) to hacked websites that contain malicious code.  One technique designed to help curb these infections is through the use of DNS blackhole.  This technique will redirect your internal users to an internal website to block their access.  To do so, first install Bind on your Linux server.  Then edit your named.conf file which should

Read More

PyMyDB Backup 0.5.1

The first version of PyMyDB Backup has been released and is based on Python 2.4.3. This is a Python script that will back up your MySQL databases, calculate the size of the backed up files, tarball and compress the contents, then email the results. To use:     Download the EPEL RPM which can be found at: http://download.fedora.redhat.com/pub/epel/ Install pymydb-0.5.1-1.noarch.rpm which can be found at: GitHub This script creates the necessary

Read More

Part 2: Adding the firewall rules

In part two of this series we’re going to discuss adding firewall rules to the router.  Everyone knows that adding ingress (or incoming) firewall rules is important to securing your network.  However, the same can be said for adding egress rules for traffic leaving your network.  For instance, aside from an email server, no client should ever send traffic to the Internet via TCP port 25.  If you see

Read More