Blog

Why Internal Penetration Testing is Important

By |2020-06-10T12:52:24+00:00June 10th, 2020|Penetration Testing|

Why Internal Penetration Testing is Important By now you know that penetration tests are vital to understanding and improving your company’s cybersecurity efforts. Internal penetration testing takes it a step further. But to truly know why an internal penetration test is important to your business, you must first understand what an internal pen [...]

Data Breach at Celebrity Law Firm

By |2020-05-18T16:46:02+00:00May 18th, 2020|Blog|

In a data breach at celebrity law firm Grubman Shire Meiselas & Sacks, Hackers claim to have stolen celebrity information. In the alleged law firm hack, the attackers claim to have access to 756 gigabytes of data, including contracts, nondisclosure agreements, phone numbers and email addresses and “personal correspondence” of the law firm’s clients. [...]

Penetration Tests, Red Team Assessments The Difference Between Them

By |2020-05-22T14:01:22+00:00May 12th, 2020|Blog|

Determining the vulnerabilities of your company’s cybersecurity program is extremely important. There are multiple ways to test your systems. Red Team Assessments and Penetration Tests are two common methodologies, and they often get confused. However, while they both determine your cybersecurity vulnerabilities, they are different in many ways, including purpose, strategy and length. [...]

Why Cybersecurity Awareness Training Should be Prioritized in 2020

By |2020-05-26T15:20:56+00:00April 23rd, 2020|Blog|

Cybersecurity awareness training can help prevent one of today’s biggest threats to your business – cyber-attacks. Even if you have the most sophisticated anti-virus, firewall systems and protocols in place, you must still rely on your employees to be a part of your cybersecurity system. That, of course, opens the door to the risk [...]

Penetration Test Frequency: How Often Should One Be Run?

By |2020-04-23T16:27:00+00:00April 21st, 2020|Blog, Penetration Testing|

How Often is Enough? A penetration test helps your organization determine if your cybersecurity or physical security is effective. It will also pinpoint any vulnerabilities in your security program and help determine solutions to the problems. As more and more data breaches happen and the cyber-attacks become more sophisticated, it is [...]

How COVID-19 is Impacting Cybersecurity

By |2020-04-24T15:10:07+00:00April 21st, 2020|Blog|

With the spread of COVID-19 around the whole world, lives are being lost and economies are taking a devastating hit. Therefore, it is also having residual effects on the cybersecurity landscape. Cyber-attacks and threats are on the increase as cybercriminals are deploying coronavirus-related phishing scams and website. While more and more people are working [...]

Achieving and Maintaining HIPAA Compliance

By |2020-04-24T15:43:46+00:00April 16th, 2020|Uncategorized, Blog|

The Health Insurance Portability and Accountability Act, also known as HIPAA, is the federal law that protects patients from having their sensitive health information disclosed without their permission. The law, enacted in 1996, established national standards for the protection of certain personal health information. The law is enforced by the Department of Health [...]

Source Code Stolen from Xbox Series X

By |2020-04-24T15:53:51+00:00April 15th, 2020|Blog|

Microsoft is expected to release its new Xbox Series X gaming console in November 2020. However, hackers are trying to release its graphics source code early. The Xbox Series X will run on AMD’s chip. AMD has confirmed that a hacker contacted the company in December 2019 purporting they had stolen test files related [...]

The Top COVID-19 Scams Right Now

By |2020-04-29T16:40:21+00:00March 24th, 2020|Blog|

COVID-19 Scams are Rampant. The world is in turmoil right now and As the coronavirus pandemic ramps up, affecting all of us, hackers and scam artists also ramp up, exploiting the fears of people around the globe. While there are numerous ways that cybercriminals will attempt to fleece their victims, the most common COVID-19 [...]