Cybersecurity New Year’s Resolutions for IT & Security Executives

Posted by Kelly Konya on Dec 28, 2018 2:09:00 PM
Read More

Topics: "Cybersecurity"

How to Fight the Most Common Scams this Holiday Season

Posted by Kelly Konya on Dec 21, 2018 11:10:00 PM

The holidays are not only the time for giving and receiving; for hackers and cyber criminals, it’s also the perfect time for taking.

Read More

Topics: "Cybersecurity"

Cost Benefits of a Penetration Test

Posted by Kelly Konya on Dec 3, 2018 4:31:00 PM

For security professionals, it can be difficult to go to the decision-makers in a company and demand that a certain amount of money is spent on penetration testing. Rather, there must be justification for the expense, and the expenditure needs to ultimately contribute to the company’s profitability. If the decision-makers don’t understand the impact pen testing can have, they will never agree to the expense.

However, ROI from services like these is not always clear.

In order to justify the need for penetration testing, security professionals must qualify and quantify the “what” and the “why” of the service. This article will explore the potential returns an organization can expect from a penetration test.

Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing"

A Lookback: National Cyber Security Awareness Month

Posted by Kelly Konya on Nov 1, 2018 2:28:00 PM

 

Read More

Topics: "Cybersecurity"

Core Elements of Effective Penetration Test Remediation

Posted by Kelly Konya on Oct 2, 2018 2:20:00 PM

A penetration test, or a “pen test,” involves a variety of both manual and automated techniques that simulate a cyberattack on an organization’s data and security.



To prioritize a holistic approach to cyber defense, organizations need to understand the environment under protection, the anomalies affecting the security of the system and—most importantly—the plan for remediation.

When reported and carried out properly, penetration tests can identify an organization’s security weaknesses and avenues of attack. With this knowledge, organizations can uncover the information and support that’s required to mitigate or remove those vulnerabilities.

Once your organization receives the test results, it’s time to prioritize your remediation efforts based on the most critical items. These items will be the most obvious points that malicious attackers will attempt to use to exploit your systems.

As you begin to measure your resources and develop your timeframe for remediation, there are several core elements you must keep in mind.

Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing"

Key Components of an Effective Penetration Test

Posted by Kelly Konya on Sep 14, 2018 2:13:00 PM

Penetration testing, or “pen testing,” is a vital part of every cyber defense program.

Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing"

The Top 8 Critical Security Components for User Accounts

Posted by Kelly Konya on Sep 7, 2018 2:01:00 PM

Modern operating systems are organized to meet the needs of various users.

User accounts, from the standpoint of a consumer, are meant to be configured and customized based on the needs of the individual who will be in control of the account. Regardless of the ultimate purpose of the account, several security-related considerations come into play that need to be addressed by proper information technology (IT) infrastructure. What follows are the 8 leading critical security components for user accounts that every organization should put into practice.

Read More

Topics: "Cybersecurity", "Account Management"