Malware 101: Criminal Strategies, Pt. 2

In our previous article, Malware 101: Criminal Strategies, Pt. 1, we explained how cybercriminals dupe their targets into downloading malicious software, potentially causing severe damage to the user’s computer. For this article, we will focus on how malware can spread unhindered through a network, without any need for authentication from users. The primary difference between […]

Malware 101: Criminal Strategies, Pt. 1

It’s easy to think, “I won’t be a victim of a cyberattack.” But the truth is that millions and millions of people in the United States alone are victims of cybercrime, and malicious emails are becoming more prominent in this cyber-dependent world. To put that into perspective, in 2017, over 20 million people were victims […]

Malware 101: Trojan Horses

Trojan Horses. Years ago, they were almost all you heard about when people talked about bugs that could damage your computer. But what exactly is a Trojan horse in the world of computers? For spyware and ransomware to work most effectively, the attacker needs to trick the user into downloading his or her malware. The […]

Malware 101: Ransomware

What could be more exciting than pirates? Villainous rogues sailing the high seas, searching for ships in the night to plunder. They come across an unsuspecting ship, ready their cannons – take aim – and in a split second, a barrage of iron and smoke rains from the sky. The shadowy ship positions itself next […]

Malware 101: Spyware

Malware has become mainstream in today’s internet age. Malware comes in many shapes and forms, and almost all of them are used for nefarious purposes. Mission Multiplier wants to make sure that you understand the dangers you face in the cyber world, malware included. That’s why we have decided to give you a few articles […]

A Quick Way to Stop SQL Injections

There are many coding best practices to adhere to. These practices usually have to do with code optimization, but there are coding practices specifically focused on making the application safer. One such example is use of a parameterized query, a query in which placeholders are used for parameters and the parameter values are supplied at […]

DFARS: What Happens After the POA&M

Organizations are finding out that DFARS compliance takes more than a POA&M and SSP. In a 2016 amendment to the Defense Federal Acquisition Regulation Supplement (DFARS), the Department of Defense laid down the law for government contractors who process Controlled Unclassified Information (CUI) from the DoD. According to DFARS Clause 252.204-7012, Safeguarding Covered Defense Information […]

Firewalls: A Hot Commodity

What is a Firewall? Firewall. It’s a term that comes from the practice of building a wall to act as a barricade to hinder the spread of fire. It serves as a barrier to prevent what is dangerous from harming what needs to be safe. In a digital network, a firewall serves the same purpose. […]

I Am Not a Robot: Treating Your People Like People for Better Cybersecurity

Let’s face it, everyone makes mistakes. People are not robots. You can’t program them to do exactly what you want them to without fail. And treating your employees like the enemy when it comes to your cybersecurity, just for them being human, isn’t just bad leadership, but also won’t do anything to improve your overall […]

The Mission Multiplier Story

It’s important to remember where you came from. As we enter into a new year, we would like to take a step back to share Mission Multiplier’s origin story. The story of Mission Multiplier started many years ago in Washington, D.C. A newly-married Jamie Miller was working 80 hours a week for a very prominent […]