Kidnap and Abductions

The Red Blog Escape a moving vehicle. Kidnapping and abductions are a scary ordeal to find yourself in. Yet they are on the rise putting you, your family members, and just about anyone at greater risk of being abducted. Fighting back against an assailant is risky and could lead to injury. However, there comes a […]

Mapping Your Network

Cyber Security Professionals Tool Kit By using a tool called Nmap a Linux utility normally used by cyber security professionals from the tool kit of kali linux, we are able to scan the network and locate any abnormal traffic or unprotected ports. Nmap provides a number of features for probing computer networks, including host discovery […]

Ransomware Prevention part 2

Red Blog Cyber Ransomware Prevention part 2 Tips to Mitigate Ransomware Attacks The increasing prevalence of cybercrime is pushing organizations to rethink their security strategies. Here are some tips that can help you mitigate ransomware attacks. • Restrict administrative privileges: Use caution when handing out administrative privileges as the admin account has access to everything, including […]