KRACK Security Flaw Protection

KRACK Security Flaw Protection

Researchers have discovered a new weakness found in the WPA2 protocol (Wi-Fi Protected Access 2), the security method which protects all modern Wi-Fi networks, known as the KRACK security flaw. Although there is no evidence at this time that the KRACK vulnerability was maliciously exploited, this still raises many concerns for both personal and enterprise … Read more

WannaCrypt Ransomware Defense

WannaCrypt Ransomware Defense

Looking for WannaCrypt ransomware defense? On Friday, May 12th, a large ransomware attack was launched, known as WannaCrypt (a.k.a. WannaCry). It infected more than 230,000 computers across 150 countries. This unprecedented cyberattack left organizations struggling in the aftermath as they try to recover. WannaCrypt demands payment of ransom in bitcoin and has spread in several … Read more

Avoid a Data Breach: What a Health Care Org Should Do

Avoid a Data Breach: What a Health Care Org Should Do There are three things that a health care organization should do immediately to avoid a data breach. They are: Execute Advanced Penetration Testing. Performing an advanced external penetration test is a strategic approach to identify weaknesses in network and application security, as would a hacker. … Read more

Debt Collection and Audits for Collection Agencies

Debt Collection and Audits for Collection Agencies

Debt collection agencies with sensitive data need to be familiar with how PCI, FISMA, SSAE 16/SOC 1 and SOC 2 apply to them. If you’re performing collections, you’re no stranger to regulatory compliance and the proactive supervision of government agencies such as the Federal Trade Commission (FTC), Consumer Financial Protection Bureau (CFPB), and the Office … Read more

Penetration Tests and Their Benefits

Penetration tests and their benefits on the brain? If performed regularly, penetration tests are key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in your security before a hacker … Read more

Strategies for Mitigating Cyber Intrusions

Strategies for Mitigating Cyber Intrusions Cyber intrusions worrying you? Looking for some basic strategies that your IT team can use to mitigate cyber intrusions? Here are four tips, courtesy of the Australian government. As part of its mission, the Australian Signals Directorate, an Australian government intelligence agency, provides advice and assistance on information and communications … Read more

Penetration Tests Help Avoid a Data Breach

Penetration tests and vulnerability scans, if performed regularly, will help your organization avoid a costly data breach.  Did you know that? So why don’t more companies get on the ball and do this? Nearly every week, we read about a malicious hacker who has penetrated a security gap in an organization’s infrastructure to gain access to loads of … Read more

Cost of Downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the … Read more

When Hackers Strike

When Hackers Strike “The battle against terrorism is not only a military battle, but primarily a battle of information” -Ahmed Chalabi   In today’s globalized and cyber-connected world, hackers are a real and present danger. The threat of “bad guys” extends to the Internet and the security of your life and personal information. Throughout history, … Read more

Security Awareness Training

Security Awareness Training

Security awareness training for employees is a critical component of compliance and security in your organization. The risk of an employee not understanding the potential security threats facing them as a frontline target could be just the opening that an attacker needs to create a security breach. You are only as strong as your weakest … Read more