vulnerability scans

Cyber Handyman Skill #5: Tools to Run Basic Vulnerability Scans

Throughout our blog series, 5 DIY Cyber Security Skills Every IT Professional Needs to Master, we have looked at skills and tools that are useful for cyber handy men and women. Much like being able to use a hammer, screwdriver, drill, or saw, having the ability to use virtualization, nmap, understand code, and the command line enables many other DIY tasks…. Read More

command line

Cyber Handyman Skill #4: Get to Know and Love the Command Line to Simplify Your IT Tasks

In our previous blog in the series, “5 DIY Cyber Security Skills Every IT Professional Needs to Master,” I discussed the basics of coding and programming that every cyber handyman needs to know. Today, I’ll cover the command line, a cyber handyman’s best friend. I first thought about going the “Top X Most Useful Commands” route for this blog… Read More

youth code jam 2017

Cyber Handyman Skill #3: Translating Coding and Programming Structures

In our previous blog in the series, “5 DIY Cyber Security Skills Every IT Professional Needs to Master,” I discussed the importance of nmap as a critical command line tool that improves network visibility and overall security. Today, I’ll cover some concepts related to translating coding and programming structures. Being a resident cyber handyman isn’t easy. Not… Read More

Cyber Handyman Skill #2: How to Scan Your Network with Nmap

Two weeks ago, we introduced our “5 DIY Cyber Security Skills Every IT Professional Needs to Master” blog series. I discussed the first skill on the list, using virtual machines (VMs), and why they’re practically indispensable for simplifying day-to-day security tasks. Today, I’ll explain the importance of the network mapper, also known as nmap — a critical… Read More

diy cyber security skills

5 DIY Cyber Security Skills Every IT Professional Needs to Master

Introducing the Cyber Handyman If you’re a homeowner like me, hopefully you have a few basic around-the-house skills – changing a light bulb, fixing a loose door handle, unclogging a shower drain, making sure the deadbolts lock properly. I run into a new issue every week it seems. If you’re fortunate, there’s at least one… Read More

mail appliances

How Our Pen Testers Get Through Your Mail Appliances

For the final blog post in our series on lessons learned from 2016 security assessments, we’ll discuss a high-risk issue our penetration testers and consultants often come across: filtering malicious emails. In our assessments, sending phishing emails with malicious payloads or links is the most common method we use to get initial access to a network…. Read More