Category Archives: Internet Security

Penetration Testing

Thorough penetration testing involves social engineering, vulnerability scanning, and the manual hacking of computer systems, networks, and web applications. Several regulatory compliances and standards recommend and/or REQUIRE pen tests. Some examples include PCI, SOX, HIPAA, GLBA, FISMA, NIST, DFARS etc. PCI-DSS regulations mandate both an annual and ongoing penetration testing after any system changes. SOX […]

Read More

October

Own IT. Secure IT. Protect IT.

In a new study, 80% of SMB respondents reported being “somewhat” or “very” concerned about a cyber breach but only 31% reported that their companies provide them with annual company-wide training. With National Cybersecurity Awareness Month beginning today, we can help bridge that gap. Established by the Department of Homeland Security, October serves as the […]

Read More

Network Security Study

Network Security Study A network security study is a helpful guide that will give you valuable insight into your environment and remediation plans for potential risks. With the guidance of our virtual Chief Information Security Officer (vCISO), you will be able to evaluate your defensive posture and overall operational security. The study will leave you […]

Read More

The Small Business Guide for Your 2019 IT Budget

As summer comes to an end and fall quickly approaches, it comes the time to start thinking of next year’s budget. Research conducted by the National Cyber Security Alliance found that almost 50 percent of all small businesses have experienced a cyber attack and more than 70 percent of cyber attacks target small businesses. With […]

Read More

It’s Time to Upgrade Your IT Infrastructure

An organization’s IT infrastructure has become a vital part of all operations and affects nearly every aspect of the business.  As such, it is critical to keep all of your systems up to date with the latest security patches. Every piece of technology that touches your network including; desktops, laptops, phones, servers, switches, etc. should […]

Read More

What can your Company Learn from the Timehop Cyber Incident?

This past weekend, the Timehop app announced a large network intrusion that affected over 21 million users. The app compiles information from all forms of social media and creates a “look back in time” for the user. The data that was breached included names, email addresses, and phone numbers. Luckily, no private messages, financial data, […]

Read More

So, You’re Suffering from a Data Breach?

Guest blog by: Andrew Davidson at AmVenture A data breach can be crippling for a small business. According to statistics provided by Small Business trends, a whopping 60% of small companies shut their doors within six months of a cyber attack, and yet only 14% of small business owners are highly confident in their ability to protect […]

Read More

Should my Business Implement the Zero Trust Model?

In the ever-changing world of cyber security the “Zero Trust” concept is a strategy that is elegant in its simplicity; do not trust anyone. The model was created by John Kindervag of Forrester Research Inc. in response to an increasing number of breaches due to the lax security on open connections.  Many organizations depend solely […]

Read More

Is cyber liability insurance necessary for my business?

The latest statistics show that 43% of cyber attacks target small businesses and 60% of those organizations attacked go out of business within 6 months of the attack. With the growing number of cyber attacks every day, the general thinking is not if you will will get breached, but when and how bad will it […]

Read More