Search Results "Cybersecurity"

Graph of COVID-19 related domain name registrations
Cybersecurity Impacts of Remote Work During Coronavirus 2019 (COVID-19)

The Coronavirus 2019 (COVID-19) pandemic has forced businesses, organizations, and government agencies to immediately change their operating model, resulting in furloughs and sending workers home to telework. Employers are struggling to ensure their employees are safe, healthy, productive, and equipped during this time.

Natsar logo
Home Page

Providing expert training in cybersecurity, digital forensics, risk management, technology, and leadership. Stay Connected Affordable Trusted Training by Experienced Instructors…

Natsar logo
About Natsar

Located in NEW YORK’S CAPITAL REGION, AND Serving the WORLD Headquartered in the Capital Region of New York just outside…

computer showing pirate flag on monitor
Digital Forensic Use Case: Hacked Device

If a hacker was able to compromise your device there are several things they may be able to do. The capabilities of the hacker is driven by the sophistication of the malware, the stability of the device’s network connection, and any security software or devices that impair or remove the malware’s ability to function.

Executive Briefing: Log4j Vulnerability

At Natsar we are dedicated to helping executives and decision-makers understand cybersecurity. This post will provide a non-technical overview of the Log4j (also known as log4shell) vulnerability and provide a resource for executives to use when talking with their IT teams or Managed Service Providers (MSPs).

Screenshot of forensic lab policy
Digital Forensics Policies and Documents

Trusted Source, Tested Policies For nearly 20-years, we have been writing policies, procedures, and forms for digital forensic labs across…

Making a Risk-Based IT Change Management Process

A key component to any successful and mature Information Technology (IT) team is a disciplined change control process.  Few things are more frustrating to a CIO than having a service affecting outage and not being able to immediately identify recent changes to the environment.


Digital Forensic Use Case: Hacked Device If a hacker was able to compromise your device there are several things they…