Cybersecurity: Leverage Your Cloud Without Compromising Cybersecurity

It is National Cybersecurity Awareness Month (NCSAM)! While enhancing your cyberspace is a 24/7 activity, we have taken the time to highlight cybersecurity practices at MetroStar to celebrate this month. Our smartphones and mobile devices' technological needs have fueled cloud computing adoption, making organizations more cost-effective and agile. Organizations must leverage the cloud safely,

By |2020-11-24T18:07:33+00:00October 28th, 2020|Categories: Cloud, Cyber Security|

Making an Impact: How a Cybersecurity Engineer Protects the Online Community

MetroStar is exploring the positive impact our people are having on the world around them. In this series, you will learn about the different roles, projects, and positive changes MetroStar’s team is helping to create. For Gen Z and Millennials, TikTok and other social media channels may be the first thing that pops into

By |2020-10-22T18:08:00+00:00October 22nd, 2020|Categories: Culture, Cyber Security|Tags: |

Cybersecurity: Best Practices to Protect Your Web Apps From Common Cyber Attacks

It is National Cybersecurity Awareness Month (NCSAM)! While enhancing your cyberspace is a 24/7 activity, we have taken the time to highlight cybersecurity practices at MetroStar to celebrate this month. Did you know there are cyber-attacks every 39-seconds? Most of these attacks target web applications, so learning the best ways to protect your web

By |2020-10-21T20:50:09+00:00October 21st, 2020|Categories: Cyber Security|

Cybersecurity: Choose the Right Security Framework to Protect Your Data

It is National Cybersecurity Awareness Month (NCSAM)! While enhancing your cyberspace is a 24/7 activity, we have taken the time to highlight cybersecurity practices at MetroStar to celebrate this month. There are 4.5 billion internet users worldwide, and you share a network with every one of them. MetroStar's Principal Cybersecurity Engineer, Farhan Badshah, shares

By |2020-10-15T13:41:37+00:00October 15th, 2020|Categories: Cyber Security|

Insider Threat Awareness Month: How to Build Resilience

Resilience: The capacity to recover quickly from difficulties; toughness. Resilience is a word that has been used often during the year 2020. It’s meaning has been shared in our homes, on advertisements, in public service announcements, and throughout companies' internal communications. The month of September is Insider Threat Awareness Month — a month to

By |2020-09-03T15:16:42+00:00September 3rd, 2020|Categories: Cyber Security, Insider Threat|Tags: |

11 Cybersecurity Best Practices You Should Apply in 2020

When we think of the start of the new year, we usually think of goals, but maybe instead of focusing on just personal goals, we can shift our focus to workplace goals. Having a list of goals written down makes you 10 times more likely to accomplish said goals. So, we’ve put together a

By |2020-10-14T15:11:35+00:00February 21st, 2020|Categories: Cyber Security|

NIST Updates Password Security Guidelines: $t0P d0!Ng Th!$

To those who think Th!$ i$ Th3 b3$t w4y t0 wr!t3 a P@$$w0rd, think again. The National Institute of Standards and Technology (NIST) has recently published new guidelines on password security, revising the old rules and deeming them counterproductive to personal security purposes. Paul Grassi, NIST Senior Standards and Technology Adviser, said in an

By |2017-12-05T17:17:39+00:00August 18th, 2017|Categories: Cyber Security|Tags: |

Report on Department of Defense IoT Devices Reveals Security Gaps

A report published by the Government Accountability Office (GAO) reveals that much improvement is required to strengthen security measures for IoT (Internet of Things) devices within the Department of Defense (DoD). The report, titled Internet of Things: Enhanced Assessments and Guidance Are Needed to Address Security Risks in DOD, outlines the existence of DoD

By |2017-08-08T16:38:10+00:00August 8th, 2017|Categories: Cyber Security|Tags: , |

Why U.S. Cyber Command is Reportedly Splitting From NSA

News that the United States Cyber Command is breaking off from the National Security Agency recently surfaced, with U.S. officials claiming the move as an effort to strengthen the country’s ability to conduct defensive and offensive cyber operations. According to various news sources, the goal of the reported separation is to make Cyber Command

By |2017-07-27T19:33:45+00:00July 27th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

The Breakdown: Protecting Yourself from Ransomware

Imagine this: you come home from work, turn the key and slowly walk into your house. As you step in, your jaw drops as you see the horrifying emptiness of your home. No furniture, no things, no trace of anything you once had. Your chest tightens. Your heart races. Your

By |2017-07-21T15:11:34+00:00July 20th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: , , |
Go to Top