Ransomware resources if you have been hacked
FBI The U.S. Federal Bureau of Investigations (FBI) has websites about cybersecurity and ransomware specifically. The FBI ransomware site is located here: https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/ransomware(opens in a new tab) NIST The National Institute of Science and Technologies is a U.S. Government agency that …
The Advantages of WPA3: The Next Level of Wi-Fi Security
As the demand for secure and reliable wireless networks grows, so does the need for advanced encryption standards. Enter Wi-Fi Protected Access 3 (WPA3)—the latest and most secure Wi-Fi encryption protocol. Introduced in 2018, WPA3 is designed to address vulnerabilities …
Securing MikroTik Routers with SSH Keys
This blog post walks you through the steps to configure SSH key-based authentication on MikroTik routers with practical examples.
Data Center physical security
Physical security in a data center is critical as it serves as the first line of defense against unauthorized access, vandalism, theft, and environmental threats. Here’s a deeper dive into the various layers and strategies involved in ensuring comprehensive physical …
Two-Factor authentication trends for modern security
In the ever-evolving landscape of cybersecurity, authentication is one of the most fundamental aspects of protecting digital identities. While traditional password-based authentication has been the norm for decades, it’s increasingly proving insufficient against sophisticated cyber threats. This is where Two-Factor …
Problems with Borger Gateway Protocol (BGP)
Border Gateway Protocol (BGP) is the Internet’s dominant inter-domain routing protocol, and as such, it is a critical component of the Internet’s infrastructure. However, BGP, like any other technology, has flaws. The following are some of the most common BGP …
Denial of Service and the xISP Part 1
Most service providers have been the victim of a Denial of Service (DoS) attack at one point or another. Sometimes you may not realize you are under an attack. A few months ago, I posted a simple screenshot at https://blog.j2sw.com/networking/anatomy-of-a-ddos/ of what …
Garmin gets hit with Ransomware
https://www.forbes.com/sites/barrycollins/2020/07/25/will-garmin-pay-10m-ransom-to-end-two-day-outage/#2e6983423164 Garmin is reportedly being asked to pay a $10 million ransom to free its systems from a cyberattack that has taken down many of its services for two days. The navigation company was hit by a ransomware attack on Thursday, …
Mikrotik BGP firewall rules for security
This content is for Patreon subscribers of the j2 blog. Please consider becoming a Patreon subscriber for as little as $1 a month. This helps to provide higher quality content, more podcasts, and other goodies on this blog.To view this …
Is your password secure?
One of the reasons to use password managers such as LastPass with 2Factor authentication