All Posts By

Frank Urbanski

3 Steps to Professional Vulnerability Management

By Cybersecurity

This is the fourth article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  The IT Department Dream Scenario Imagine your CIO has the following information at his or her fingertips: Exactly how many machines are in their environment All the vulnerabilities for each device All the available patches A list of priorities to show which issues are most critical And what else could complete this dream scenario? For any patch that isn’t available or installable, the team has a mitigation plan to address…

Read More

How to Protect Against Phishing Attacks

By Cybersecurity

This is the third article in our 10-part series for National Cybersecurity Awareness Month. Look for new cybersecurity topics explained by Alpine Cyber experts every Tuesday and Thursday in October.  About Your Recent Amazon Order Did you order something from Amazon lately? If so, the following email would look right at home in your inbox:   The savviest user can look at this and know that it belongs in the trash can. It doesn’t show anything about the order items, the email is from a phony domain (amazon-shipping-updates.com) and most importantly when you hover over the link you’ll see it’s…

Read More

Why the MySpace Breach Matters, Even if MySpace Doesn’t

By Cybersecurity

You may have seen over the last few days reports of MySpace username and password combinations for sale on hacker spaces. MySpace was breached, and a possible 360 million accounts with 427 million passwords could have been stolen. Yes, MySpace has long since been dominated by almost all other social networks that you can think of today.  So who cares? You should. The first topic applies directly to the user – password reuse. We have talked about this numerous times in previous blogs, and the point still stands. The odds are favorable that either you or your coworkers have/had an account with MySpace….

Read More

Amazon Web Services: The Magic of Lambda

By Cloud Computing No Comments

Here at Alpine we are in love with Amazon Web Services (AWS), and for good reason. They are by far the leading cloud platform and always push innovation. AWS has many different services, but the one we will focus on today is Lambda. Lambda gives you the ability to run code (written in Node.js, Java, or Python) without the need to have a server powering it, as far you you are aware or care. But how can this be real? We are used to running code. A server is stood up and libraries are loaded onto it. From there we…

Read More

Enterprise IT Techniques at Home

By Cybersecurity No Comments

Even though your home network is not a corporate network you are still at risk for cyber crime and attacks. Whether it is a crypto virus locking up your family photos or attackers stealing your payment information, there are real reasons to want to protect your home network. Jeremy went into it a bit in our last blog about network segmentation. While this is just one thing you can perform as a home network protector, there are other steps you can take to ensure you are doing the best you can to keep your family’s information safe.  Some of these items are easy for the…

Read More