It’s not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably. The truth is, the two are very different.
Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered.
Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!” Unless you have Cylance.
There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.
As a cybersecurity professional, chances are that having a keylogger installed on any of your company’s machines is one of your worst-case scenarios. Once a keylogger is installed, nothing is sacred. Passwords, proprietary information, and banking credentials are just a few ...
The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.
At Ascend Technologies we spend a lot of time breaking into our clients’ networks as part of our Penetration Testing services. A major component of our methodology involves social engineering.
We're addressing a question we get asked all the time: What does a hacker look like?
By now, you are likely familiar with the term SaaS or “Software-as-a-Service.” This is where you pay a subscription fee to use software like Microsoft Office 365 or Dropbox. These kinds of services are billed as ones that continuously keep your software as up-to-date in a ...
Voter data on 198 million (yes that’s million) US citizens was improperly stored and freely available for 12 days on the Internet. There has never been a data breach this big. The information includes: birthdates, home addresses, telephone numbers, political views, ...
Here is a reminder that you need to be alert for fake emails that look like they come from your local police or State Dept of Motor Vehicles (DMV) claiming you have a traffic violation. At the moment, there is a local scam in New York that falsely states you have ...
Surviving as a professional in the cybersecurity realm is no easy task, but the need for more of us is ever-increasing. Below are some tips and tools that you might find useful if cybersecurity has been entrusted to you.
The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015. In fact, The Business Journals’ latest SMB Insight study ...
If you are like most executives caught up in the constantly-evolving threat landscape, you’re likely overwhelmed with trying to effectively secure your data. We still encounter organizations starting their security from square one on a fairly regular basis, and we know it’s ...
When it comes to technology infrastructure, change always carries some measure of risk. Even minor network and server reconfigurations can cause unexpected problems, making complete reviews of any system modification a crucial task. This includes analyzing how each ...