Cisco Talos…so dumb
If you’ve read our blogs, heard our talks at our local KLUG group, personally talked to me or conversed via email you all know how much I love Cisco (eye rolls). I was at an event in Lansing, MI recently about small business in Michigan (SBAM). A rather derpy VAR […]Read More
Why the hackers are winning reason #2
Here’s a reason the hackers are winning: Reason #2: Lazy good for nothing ISP / hosting company security teams & poor practices (#ISPidiots). We operate our own RBL, Realtime Block List (although…most like to call it a black list or a black-hole list we don’t use that term and who […]Read More
DNS block lists & why you NEED to use them!
We all know about IPBL’s or “IP Block Lists” (a.k.a IP Blackhole Lists). They’re great right? What about applying the same logic to DNS? DNS works like this: On your computing device you browse to yahoo.com and your computing device says…hey, I don’t happen to know what yahoo.com is…hey DNS […]Read More
IP Block Lists
There are many ways to protect your network. One of the many ways EITS works to protect their clients is with a “honey pot” the unsuspecting hacker or hacker bot finds. They or their mechanisms try to hack any number of services (mail, ftp, ssh, etc) which we detect then […]Read More