Nathan Studebaker

Picture of

RDP Brute Force Attack Detection and Blacklisting with Powershell

Nathan Studebaker

Overview Monitoring systems provide great value because they alert us to unusual events. They allow us to check a box on our audit sheet, but really a monitoring system is just half of the equation.…

Read More

WatchPoint - Tip of the Week - Account Lockout Detection and Notification

Nathan Studebaker

Overview Network security has several moving parts. Of those parts, detection and notification are arguably the most important. Detection/notification are usually the first steps in any security…

Read More

Employee Emergency Notifications

Nathan Studebaker

Use PowerShell and Exchange to Notify All Employees through Text Message Do you worry about the safety of your friends, family, and coworkers? It seems like every day there is a report of an active…

Read More

The Comeback of the Honeypot

Nathan Studebaker

A Brief History of the Honeypot  No, not the organic, non-gmo, honey we all love. Today we're talking about Honeypot computer systems.

Read More

How to Deceive Hackers into Exposing Themselves

Nathan Studebaker

We’ve seen it acted out a hundred times on the big screen. The tough-talking cop, who towers over the newly arrested suspect, hands still cuffed behind their back, as the bright lights of justice…

Read More

Adapt or get Hacked - It takes a Village to Secure a Network

Nathan Studebaker

Adapt or get Hacked - It takes a Village to Secure a Network  We’ve all heard that it takes a village to raise a child. What you’ve probably never heard is that it takes a village to secure a…

Read More

The Golden Hour of Cyber Security

Nathan Studebaker

New data from the 2015 Verizon Data Breach Report shows that businesses have a one-hour window to detect a data breach and contain it. After that, they risk losing control of their network.  The term…

Read More

Endpoints are the New Perimeter –How Endpoint Security Can Protect Your Business

Nathan Studebaker

Geronimo !!! Endpoints have become the new prized possession in the eye of the cyber-criminal. Just like normal domain users, once an endpoint is compromised, an attacker is free to roam about the…

Read More

The $3.6 Million Dollar Ransom –  Learn from the Mistakes of Others

Nathan Studebaker

The Verge recently published an article, announcing that a Los Angeles hospital was the victim of a data breach using ransomware. In most cases, a ransomware hacker charges several hundred dollars,…

Read More

Top Threats Still the Same - 2015 Verizon Data Breach Report Review

Nathan Studebaker

  If it ain't broke, don't fix it... Is the most common response I get, whenever I ask IT administrators and executives why they don't patch their systems. The funny thing is that the response is…

Read More