Malware 101: Trojan Horses

Trojan Horses. Years ago, they were almost all you heard about when people talked about bugs that could damage your computer. But what exactly is a Trojan horse in the world of computers? For spyware and ransomware to work most effectively, the attacker needs to trick the user into downloading his or her malware. The […]
Malware 101: Ransomware

What could be more exciting than pirates? Villainous rogues sailing the high seas, searching for ships in the night to plunder. They come across an unsuspecting ship, ready their cannons – take aim – and in a split second, a barrage of iron and smoke rains from the sky. The shadowy ship positions itself next […]
Malware 101: Spyware

Malware has become mainstream in today’s internet age. Malware comes in many shapes and forms, and almost all of them are used for nefarious purposes. Mission Multiplier wants to make sure that you understand the dangers you face in the cyber world, malware included. That’s why we have decided to give you a few articles […]
A Quick Way to Stop SQL Injections

There are many coding best practices to adhere to. These practices usually have to do with code optimization, but there are coding practices specifically focused on making the application safer. One such example is use of a parameterized query, a query in which placeholders are used for parameters and the parameter values are supplied at […]
DFARS: What Happens After the POA&M

Organizations are finding out that DFARS compliance takes more than a POA&M and SSP. In a 2016 amendment to the Defense Federal Acquisition Regulation Supplement (DFARS), the Department of Defense laid down the law for government contractors who process Controlled Unclassified Information (CUI) from the DoD. According to DFARS Clause 252.204-7012, Safeguarding Covered Defense Information […]
Firewalls: A Hot Commodity

What is a Firewall? Firewall. It’s a term that comes from the practice of building a wall to act as a barricade to hinder the spread of fire. It serves as a barrier to prevent what is dangerous from harming what needs to be safe. In a digital network, a firewall serves the same purpose. […]
I Am Not a Robot: Treating Your People Like People for Better Cybersecurity

Let’s face it, everyone makes mistakes. People are not robots. You can’t program them to do exactly what you want them to without fail. And treating your employees like the enemy when it comes to your cybersecurity, just for them being human, isn’t just bad leadership, but also won’t do anything to improve your overall […]
The Mission Multiplier Story

It’s important to remember where you came from. As we enter into a new year, we would like to take a step back to share Mission Multiplier’s origin story. The story of Mission Multiplier started many years ago in Washington, D.C. A newly-married Jamie Miller was working 80 hours a week for a very prominent […]
New Year’s Resolutions for Cybersecurity

As December draws to a close and you start to set your goals for next year, consider adding in some New Year’s resolutions focused on improving your cybersecurity. Here are some suggestions from a few of us at Mission Multiplier: “Make sure your home systems are secure.” – Miles Routinely check to make sure everything […]
Net Neutrality: What’s the Big Deal?

All over the news, there has been talk of net neutrality and FCC Chairman Ajit Pai’s plan to deregulate the internet. And while it might not have much to do with cybersecurity in particular, net neutrality has a massive impact on the internet at large, making it top-of-mind for tech companies like us. Net neutrality […]