Sage Advice - Cybersecurity Blog

Ron Bernier

Recent Posts

Exploit Kit 101 - What You Need to Know

Back in the day, hackers needed to write their own code to exploit systems.  But times have changed!  Today’s hackers can license software, known as exploit kits, from other hackers – sometimes for less than a night on the town – that make attacking your systems quicker and easier than ever before. 

Read More

Topics: Malware, Cyber Defense, Ransomware

With Log Analysis It's All About The Base... and Context, too

You've heard the question, "If a tree falls in a forest and no one is around to hear it, does it make a sound?" Whether or not it does, the question as it pertains to cybersecurity and log analysis can be re-worded a bit: "If an event is created in your logs and no one is around to review it, does it create a problem?"

Read More

Topics: Log Analysis, Threat Detection Tips, Cyber Defense