Blog Back to HomeHome Blog Popular Posts Penetration Test Quick Tips Small Business What to Look For in a Penetration Testing Proposal? A penetration testing proposal or quote for penetration testing services serves two primary purposes. The first, obviously, is to provide … By: Kyle Bork May 6, 2019 2 Min Read Incident Response Security Incident Containment Checklist We've written previously about some helpful checklists for small-medium sized businesses about their incident response process in general and for … By: JR Johnson March 27, 2020 3 Min Read Internal Penetration Test Vulnerability Walkthrough Vulnerability Walkthrough – NBNS and LLMNR Spoofing In this blog, we are going to walk through one of the most common ways we get an initial foothold … By: Matt Miller March 20, 2019 4 Min Read Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Education Small Business What Is The Ohio Data Protection Act? On August 3, 2018, Governor John Kasich signed Senate Bill 220, also known as the “Ohio Data Protection Act“. Unfortunately, this caused some confusion … By: Kyle Bork September 18, 2019 2 Min Read Education OSINT What is OSINT? Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through "open sources." … By: JR Johnson September 16, 2019 2 Min Read Education Penetration Test Usability vs. Security: The Age-Old Battle One of the age-old battles in information security is balancing the trade-offs between usability vs. security. We recently had a … By: Matt Miller September 13, 2019 2 Min Read Education Small Business Penetration Testing RFPs – Tips and Tricks Penetration testing requests for proposals (RFPs) or requests for quotes (RFQs) can be a great way to bid on and … By: Kyle Bork September 11, 2019 2 Min Read Physical Penetration Test Problems What Can Go Wrong During a Physical Penetration Test As with every type of penetration test we perform, our engineers are experienced and know how to balance the goal … By: Matt Miller September 6, 2019 3 Min Read Social Engineering Spot a Vishing Attack – Helpful Tips As we have previously discussed, a vishing attack is usually one of the most successful types of social engineering both … By: Kyle Bork September 4, 2019 3 Min Read Education Ransomware & The Importance of Offline Backups In today's blog, we are going to look at how ransomware works and why it necessitates the use of offline … By: Matt Miller August 30, 2019 3 Min Read Current Events Education What is the South Carolina Insurance Data Security Act? South Carolina became the first state to pass cyber security legislation for insurance companies in 2018. The South Carolina Insurance … By: Kyle Bork August 28, 2019 2 Min Read HIPAA HIPAA Compliance – Covered Entity vs. Business Associate The path to HIPAA compliance is paved with many hurdles. One of the first issues most organizations encounter is identifying … By: JR Johnson August 26, 2019 2 Min Read Load more Page 20 of 41« First«...10...1819202122...3040...»Last »
Penetration Test Quick Tips Small Business What to Look For in a Penetration Testing Proposal? A penetration testing proposal or quote for penetration testing services serves two primary purposes. The first, obviously, is to provide … By: Kyle Bork May 6, 2019 2 Min Read
Incident Response Security Incident Containment Checklist We've written previously about some helpful checklists for small-medium sized businesses about their incident response process in general and for … By: JR Johnson March 27, 2020 3 Min Read
Internal Penetration Test Vulnerability Walkthrough Vulnerability Walkthrough – NBNS and LLMNR Spoofing In this blog, we are going to walk through one of the most common ways we get an initial foothold … By: Matt Miller March 20, 2019 4 Min Read
Education Small Business What Is The Ohio Data Protection Act? On August 3, 2018, Governor John Kasich signed Senate Bill 220, also known as the “Ohio Data Protection Act“. Unfortunately, this caused some confusion … By: Kyle Bork September 18, 2019 2 Min Read
Education OSINT What is OSINT? Conducting OSINT, or open source intelligence, operations refers to the act of gaining information about a target through "open sources." … By: JR Johnson September 16, 2019 2 Min Read
Education Penetration Test Usability vs. Security: The Age-Old Battle One of the age-old battles in information security is balancing the trade-offs between usability vs. security. We recently had a … By: Matt Miller September 13, 2019 2 Min Read
Education Small Business Penetration Testing RFPs – Tips and Tricks Penetration testing requests for proposals (RFPs) or requests for quotes (RFQs) can be a great way to bid on and … By: Kyle Bork September 11, 2019 2 Min Read
Physical Penetration Test Problems What Can Go Wrong During a Physical Penetration Test As with every type of penetration test we perform, our engineers are experienced and know how to balance the goal … By: Matt Miller September 6, 2019 3 Min Read
Social Engineering Spot a Vishing Attack – Helpful Tips As we have previously discussed, a vishing attack is usually one of the most successful types of social engineering both … By: Kyle Bork September 4, 2019 3 Min Read
Education Ransomware & The Importance of Offline Backups In today's blog, we are going to look at how ransomware works and why it necessitates the use of offline … By: Matt Miller August 30, 2019 3 Min Read
Current Events Education What is the South Carolina Insurance Data Security Act? South Carolina became the first state to pass cyber security legislation for insurance companies in 2018. The South Carolina Insurance … By: Kyle Bork August 28, 2019 2 Min Read
HIPAA HIPAA Compliance – Covered Entity vs. Business Associate The path to HIPAA compliance is paved with many hurdles. One of the first issues most organizations encounter is identifying … By: JR Johnson August 26, 2019 2 Min Read