<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mukesh Verma</title>
    <description>The latest articles on DEV Community by Mukesh Verma (@mukesh_verma_).</description>
    <link>https://dev.to/mukesh_verma_</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F819722%2Fce1a2fa3-b606-407c-8e00-bca22fb88cb4.jpg</url>
      <title>DEV Community: Mukesh Verma</title>
      <link>https://dev.to/mukesh_verma_</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mukesh_verma_"/>
    <language>en</language>
    <item>
      <title>What to do in case of Ransomware Attack.</title>
      <dc:creator>Mukesh Verma</dc:creator>
      <pubDate>Sat, 02 Jul 2022 15:33:53 +0000</pubDate>
      <link>https://dev.to/mukesh_verma_/what-to-do-in-case-of-ransomware-attack-52c0</link>
      <guid>https://dev.to/mukesh_verma_/what-to-do-in-case-of-ransomware-attack-52c0</guid>
      <description>&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  What to do in case of Ransomware Attack.
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
1.Disconnect the infected computer. Isolate the other suspected computers from the network.&lt;br&gt;
2.Check other computer sand servers on the network for the signs of encryption, altered files. In case of doubt disconnect from network. Then scan from anti ransomware package without connecting to the network.&lt;br&gt;
3.Avoid paying Ransomware.&lt;br&gt;
4.Report attack to law enforcement if required.&lt;br&gt;
5.Rebuild your operating system, put all the latest security patches and update definitions of you AV. Don't put the generic accounts/passwords which were used earlier org wide. Attacker might have got these credentials already and he can come back on the new machine if same credentials are enabled in new machines.&lt;br&gt;
6.Check all directly attached network storage for the infections and disconnect them from network.&lt;br&gt;
7.Check for the data exfiltration.&lt;br&gt;
8.Warn users not to open/click any suspicious email, as this can infect their machine.&lt;br&gt;
9.Conduct detailed study that how the attack had happened and what was the initial infection point, what vulnerability was leveraged to further attack the systems and propagate in the environment.&lt;br&gt;
10.Enable MFA for users, if not enabled. &lt;/p&gt;

&lt;p&gt;For more information you can also reach me out &lt;a href="mailto:mukesh@eshieldconsulting.com"&gt;mukesh@eshieldconsulting.com&lt;/a&gt;&lt;br&gt;
&lt;a href="http://eshieldconsulting.com"&gt;http://eshieldconsulting.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ransomeware</category>
      <category>protection</category>
      <category>cybersecurity</category>
      <category>itsecurity</category>
    </item>
    <item>
      <title>How to make your career in Cyber Security</title>
      <dc:creator>Mukesh Verma</dc:creator>
      <pubDate>Fri, 06 May 2022 11:32:32 +0000</pubDate>
      <link>https://dev.to/mukesh_verma_/how-to-make-your-career-in-cyber-security-54bk</link>
      <guid>https://dev.to/mukesh_verma_/how-to-make-your-career-in-cyber-security-54bk</guid>
      <description>&lt;p&gt;Hi I am Cyber Security professional with 12 Plus years of experience and the below certifications&lt;/p&gt;

&lt;p&gt;▪ISO 27001:2005 and ISO 27001:2013 (ISMS-LA)&lt;/p&gt;

&lt;p&gt;▪CISA (Certified Information Systems Auditor) ( ISACA)&lt;/p&gt;

&lt;p&gt;▪CRISC (Certified in Risk and Information Systems Control) (ISACA)&lt;/p&gt;

&lt;p&gt;▪CISM (Certified Information Security Manager) (ISACA)&lt;/p&gt;

&lt;p&gt;▪SANS 504 Hackers Tools Techniques Exploits and Incident Handling, GIAC GCIH Certified.&lt;/p&gt;

&lt;p&gt;▪CISSP (Certified Information Security Professional) (ISC2)&lt;/p&gt;

&lt;p&gt;▪CCSK (Certificate of Cloud Security Knowledge (Cloud Security Alliance)&lt;/p&gt;

&lt;p&gt;▪CDPSE (Certified Data Privacy Solutions Engineer) (ISACA)&lt;/p&gt;

&lt;p&gt;▪OSCP(Offensive Security Certified Professional)&lt;/p&gt;

&lt;p&gt;▪ISO27001:2013 ISO/IEC 27001. Information Security Management System 2022&lt;/p&gt;

&lt;p&gt;▪ISO/IEC 27701. Privacy Information Management System 2022&lt;/p&gt;

&lt;p&gt;▪ISO 22301 Business Continuity Management System. 2022&lt;br&gt;
I am planning to write article for the upcoming hackers. So that people looking for resources can kickstart their career.&lt;/p&gt;

&lt;p&gt;After completing education and gaining experience below is my summary which I will recommend to the new comers in the domain.&lt;/p&gt;

&lt;h1&gt;
  
  
  Cyber Security is big vast subject. One need to build basic foundation of IT and then start with cyber security.
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Some of the subdomains of Cyber Security are
&lt;/h1&gt;

&lt;p&gt;1)Information Security Governance and Compliance (ensuring Policy Procedures, are implemented and followed)&lt;br&gt;
2)Vulnerability Management &amp;amp; Penetration Testing (Web, Mobile, Infrastructure)&lt;br&gt;
3)Information Security Monitoring and Response (Monitorring for threats and security incidents in real time and responding)&lt;br&gt;
4)Information Security Risk Management(Managing the Information Security risks for the organization considering external, internal local and regulatory requirements )&lt;br&gt;
There can be further segregation you can see in companies.&lt;/p&gt;

&lt;p&gt;Most of the newcomers get attracted towards ethical hacking, bug bounty. This is great but it requires lot of exposures and understanding to do excel and for beginners I will recommend to understand the basics and then jump into it.&lt;/p&gt;

&lt;p&gt;Cyber Security is domain where you need to be pushing yourself every days and you need to be aware of what all things are happening in the domain specially for bug hunters, and vulnerability management candidates. &lt;/p&gt;

&lt;p&gt;New comers should try and understand basic concept of all the subdomain and then pick one and then start working on it.&lt;br&gt;
If you need any support or help you can reach me out directly at twitter: mukesh_verma_&lt;br&gt;
or &lt;a href="mailto:mukeshverma@msn.com"&gt;mukeshverma@msn.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This blog is sponsored by&lt;br&gt;
&lt;a href="https://mditservices.in"&gt;https://mditservices.in&lt;/a&gt;&lt;br&gt;
&lt;a href="http://eshieldconsulting.com/"&gt;http://eshieldconsulting.com/&lt;/a&gt;&lt;br&gt;
&lt;a href="http://eshieldconsulting.in/"&gt;http://eshieldconsulting.in/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>career</category>
      <category>internship</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
