January 25, 2021

Transport Layer Security (TLS)

What is TLS? Communication via the Internet is made possible by data exchanges between properly functioning servers, routers, and other devices. The exchanges between your smartphone and/or computer and those devices are susceptible to eavesdropping at any point in the process. In order to prevent someone  from listening in to your Internet activities computers, smartphones,…


September 9, 2020

Web Shells Risk Advisory

Web shells allow remote administration on web servers. They may be used for legitimate purposes, but they are often installed by cybercriminals and other adversaries to gain unauthorized access to systems and networks, including those at universities. Our new risk advisory has more information about this threat and tactics for mitigating it. Go to advisory…


April 3, 2020

Security Tips for Remote Work

Use Sophos Antivirus for Personal Devices And other considerations in the world of working remotely The news related to the COVID-19 pandemic, and the stay-at-home measures that have been enacted in response to it, have spawned new opportunities for various types of scams. This is a critical time to take steps to secure your computers,…


May 23, 2019

Mitigating Cross-site Scripting (XSS) Vulnerabilities

A cross-site scripting (XSS) vulnerability was recently discovered on your site. Why should you care and what should you do? First, what exactly is cross-site scripting (XSS)? XSS is an exploit that provides an attacker a way to execute malicious JavaScript in a victim’s browser. In other words, if your site has an XSS vulnerability,…


Mitigating SQL Injection (SQLi) Vulnerabilities

A(n) SQL injection vulnerability was recently discovered on your site. Why should you care and what should you do? First, what exactly is SQL injection? SQL injection is a form of attack in which malicious SQL statements are inserted into a web page form field and executed. Web pages/applications vulnerable to SQL injection essentially place…


October 15, 2018

Logging Cheat Sheets

In several of our Information Security Briefing sessions, we have heard about the importance of logging for anomaly detection and incident response. Below is a link to various “cheat sheets” for logging to help you enable and configure system logs. Please note this is not an endorsement of this vendor; we are posting for information…