(402) 261-0123

Archive

Be informed, be secure

Justin on InSecurity Podcast

Justin on InSecurity Podcast

Our very own Justin Kallhoff, Infogressive founder and CEO, joined Matt Stephenson, host of Insecurity Podcast, for a discussion about securing SMBs (small to mid-sized businesses).

Justin and Matt chat about:

Infogressive Launches Endpoint Detection & Response Service

Infogressive Launches Endpoint Detection & Response Service
f Infogressive, said, "Adding EDR to our MSSP platform provides our security team with the visibility to detect and isolate a variety of attacks. Not surprisingly, hackers have learned to bypass many traditional security defenses; it’s our mission to st... read more

Families Are Targets, Too: 5 Home Cybersecurity Tips

Families Are Targets, Too: 5 Home Cybersecurity Tips

It's not just big businesses that are at risk of being hacked or cyber-attacked.

It may seem scary to let your kids–or yourself–go online after you hear that, but don't throw all the computers away and live off-the-grid just yet. Try implem... read more

Security Engineer’s Guide to EDR

5 Easy Ways to Improve Your Cybersecurity at Work

5 Easy Ways to Improve Your Cybersecurity at Work
It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity. They say the end-user is the weakest link—that’s you! Whether you know it or not, cyber criminals see you as an easy target. But don’t worry,... read more

Anatomy of an MSP: Breaking & Entering

Anatomy of an MSP: Breaking & Entering
We all know that security is hard… for an MSP, it’s even more difficult. In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, customer networks take... read more

10 Mistakes That Will Get You Hacked

10 Mistakes That Will Get You Hacked
Sometimes, it's the little things that make a big difference. This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton: ... read more

Business Email Compromise: What is it, and how can it affect me?

Vulnerability Management: Don’t Be That Guy

Vulnerability Management: Don’t Be That Guy
Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… and didn’t stay up to date on vulnerabili... read more

Scam Alert: Sextortion Email Using Real Passwords

Scam Alert: Sextortion Email Using Real Passwords
In the past 48 hours, security operators have seen a new ‘sextortion’ message begin popping up in client inboxes almost everywhere. The most frightening part of this message is that it lists a password either in the subject line or the first sentence.... read more

A Simple Guide to Online Privacy and Protecting Your Identity

A Simple Guide to Online Privacy and Protecting Your Identity
It is easier than ever for cyber criminals to obtain your private information, especially when "trustworthy" sites are the ones putting it on the line. Follow these simple steps to ensure you're doing what you can to keep your information safe at w... read more

Analysis of a DocuSign Phishing Email

Don’t Get Hooked! 7 Signs of a Phishing Email

Don’t Get Hooked! 7 Signs of a Phishing Email
it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon's 2017 Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user-level... read more

Healthcare Case Study -Malware on Surgical Laser

Healthcare Case Study -Malware on Surgical Laser
ase studies that give you goosebumps thinking about the current state of cybersecurity in the healthcare industry. For example, a medical laser being infected by malware. Read on for the details.

The Organization... read more

CEO, Justin Kallhoff’s Interview with Bar Napkin Business

CEO, Justin Kallhoff’s Interview with Bar Napkin Business

11 Years Ago, Justin Kallhoff, our CEO saw a significant gap in the cybersecurity of businesses. Large businesses have sufficient funds for the cybersecurity needed. Small to medium businesses however, are left with little to no pr... read more

Cylance Case Study – Energy

Cylance Case Study – Financial

Cylance Case Study – Healthcare

Scam Alert – Cyber Monday

Scam Alert – Cyber Monday

Scam Alert - Cyber Monday is coming and scammers will take advantage!

Savvy criminals are getting ready to celebrate the holiday season just like we are. The... read more

U.S. Warns about Phishing Attacks on Utility Companies

U.S. Warns about Phishing Attacks on Utility Companies

U.S. warns about phishing attacks on nuclear, energy, aviation, water, and manufacturing industries 

The U.S government issued a rare public warning that sophisticated hackers are tar... read more

Scam Alert – Netflix email

Scam Alert – Netflix email

Scam Alert - Hackers are sending emails, falsely claiming your Netflix account has been suspended. These emails look just like the real thing. They are trying to get your login information and your credit card data. read more

Alert: Bad Rabbit Ransomware

Alert: Bad Rabbit Ransomware

What we know so far...

Looks like there's a new kid on the block in Ransomware today that is creating havoc for a number of organizations in Russia, Ukraine, Germany, and Turkey. Sources have confirmed that several media sites in Russ... read more

Infogressive is Growing Stronger

11 Years of Work and Play at Infogressive

11 Years of Work and Play at Infogressive

11 Years Ago - DVDs were being sold in Japan, the internet exceeded 10 million users for the first time, Ebay became a reality and our CEO began a mission to make the internet a safer place.

2006 - Infogressive, Inc. was founded in ... read more

What Do You Have That Cyber Criminals Want?

What Do You Have That Cyber Criminals Want?
You may not realize it, but you, your company, and your employees are all targets for cyber criminals. Computers, mobile devices, accounts and your information all have tremendous value.

Usernames & Passwords

If your computer or mobile d... read more

Whiteboard Wednesdays: Major Equifax Breach and What You Can Do

Whiteboard Wednesdays: Major Equifax Breach and What You Can Do
The recent breach reported by Equifax is massive, with more information surfacing all the time. When something like this happens, we hear a lot of questions from concerned individuals, such as: Could this happen to our business or organization? Could... read more

Whiteboard Wednesdays: Hackers – Good vs. Bad

Whiteboard Wednesdays: Hackers – Good vs. Bad
When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives and bank... read more

Whiteboard Wednesdays: Strong Passwords

Whiteboard Wednesdays: Strong Passwords
Passwords are important, they are the equivalent to your house keys, car keys or even your debit card. Having strong, secure passwords is critical. Think of it this way, if you had to hide your house keys every day when you leave for work, would you hi... read more

Scam Alert

Scam Alert

Scam Alert - Bad guys are exploiting the Hurricane Harvey disaster. You may see messages on social media or, you may even receive an email asking you to donate to #HurricaneHarvey. Scammers are sending fake links, designed to take yo... read more

Whiteboard Wednesdays: New Car vs. AV Software

Whiteboard Wednesdays: New Car vs. AV Software
Think of the last time you purchased a brand new car. What if it didn't work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition ... nothing. The car won't start. You might head back into the dealership (... read more

Whiteboard Wednesdays: Are You A Target?

Whiteboard Wednesdays: Are You A Target?
When you think about organizations that have experienced a data breach, what are the first ones that come to mind? If you’re like most people, chances are your answers were likely Target, Home Depot, The IRS, Anthem Blue Cross, or... read more

Client Spotlight: Adam Walter

Client Spotlight: Adam Walter
There is nothing more important to us at Infogressive than our customers. Through roles in both the public and private sector, Adam Walter has retained our team to work with him on a wide variety of cybersecutiy needs. As he says in t... read more

Penetration Test vs. Risk Assessment? Follow Our Flowchart to Find Your Answer

Whiteboard Wednesdays: MSP vs. MSSP

Whiteboard Wednesdays: MSP vs. MSSP
It seems like there’s always a new buzzword or acronym emerging in the IT and Cybersecurity industries. It can be tough to keep up on what they are and what they mean. The differences between a Managed Services Provider (MSP) and ... read more

Whiteboard Wednesdays: Vulnerability Scanning Authentication

Whiteboard Wednesdays: Vulnerability Scanning Authentication
Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially ... read more

Client Spotlight: Cornhusker Bank

Client Spotlight: Cornhusker Bank
As a $500m bank with 10 locations throughout Lincoln, Cornhusker Bank has a lot of data to protect. Facing threats that were constantly evolving and an incumbent MSSP that wasn’t hitting the mark, they knew it was time to make a change. To overcome t... read more

Cylance vs. Malware Posing as a Sneaky Flash Installer

Cylance vs. Malware Posing as a Sneaky Flash Installer
Written By: Derrick Masters, Security Engineer Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. "Oh crap. What'd they hit? Where's it going? What IS this?!" ... read more

Infogressive Earns Cylance MSSP Partner of the Year Award

Infogressive Earns Cylance MSSP Partner of the Year Award

Lincoln, NE (7.27.17) - Leading Cybersecurity Company, Cylance Inc., has awarded Infogressive, Inc. the 2016 MSSP (Managed Security Service Provider) Most Valuable Partner of the Year.

Justin Kallhoff, Chief Executive Off... read more

Whiteboard Wednesdays: Vulnerability Scans vs. Penetration Tests

Whiteboard Wednesdays: Vulnerability Scans vs. Penetration Tests
There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for ... read more

Whiteboard Wednesdays: The Basics of Keylogger Protection

Whiteboard Wednesdays: The Basics of Keylogger Protection
As a cybersecurity professional, chances are that having a keylogger installed on any of your company’s machines is one of your worst case scenarios. Once a keylogger is installed, nothing is sacred. Passwords, proprietary information, and banking cr... read more

Whiteboard Wednesdays: Flat vs. Segmented Networks

Whiteboard Wednesdays: Flat vs. Segmented Networks
The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment. Follow along in th... read more

Whiteboard Wednesdays: Social Engineering 101

Whiteboard Wednesdays: Social Engineering 101
Every Wednesday our engineers take on a new cybersecurity topic as part of our Whiteboard Wednesdays series. At Infogressive we spend a lot of time breaking into our clients’ networks as part of our read more

Whiteboard Wednesdays: What Does A Hacker Look Like?

Whiteboard Wednesdays: What Does A Hacker Look Like?
Infogressive is excited to begin our new Whiteboard Wednesdays series! What is Whiteboard Wednesdays, you ask? Every Wednesday our Security Engineers tackle a new topic in a bite-sized video, with the goal of providing some useful ins... read more

Scam of the Week – June 20, 2017

Scam of the Week – June 20, 2017
Voter data on 198 million (yes that's million) US citizens was improperly stored and freely available for 12 days on the Internet. There has never been a data breach this big. The information includes: birthdates, home addresses, telephone numbers, pol... read more

Scam of the Week – June 5, 2017

Scam of the Week – June 5, 2017
Here is a reminder that you need to be alert for fake emails that look like they come from your local police or State Dept of Motor Vehicles (DMV) claiming you have a traffic violation. At the moment, there is a local scam in New York that falsely stat... read more

Ten Cybersecurity Tips and Tools for Professionals in the Industry

Ten Cybersecurity Tips and Tools for Professionals in the Industry
Written By: Michael Wisthoff, Information Security Analyst Surviving as a professional in the cybersecurity realm is no easy task, but the need for more of us is ever increasing. Below are some tips and tools that you might find useful if cybers... read more

Warning Signs of a Cyber Attack

Warning Signs of a Cyber Attack
Written By: Jared Froehlich, Security Account Manager The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the read more

Starting Your Cybersecurity Strategy From Scratch? Follow These 4 Steps

Starting Your Cybersecurity Strategy From Scratch? Follow These 4 Steps
ure Written By: Cory Rutten, Security Account Manager If you are like most of the business owners we talk to these days, you’re likely overwhelmed with trying to effectively secure your data. We still encounter organizations starting the... read more

CylancePROTECT vs. RansomFree: Do You Get What You Pay For?

CylancePROTECT vs. RansomFree: Do You Get What You Pay For?
Written By: Derrick Masters, Security Engineer As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have so... read more

Hotel Hacked in Austria – Third Time is a Charm?

Hotel Hacked in Austria – Third Time is a Charm?
Written By: Jeff Eckley, Security Account Manager Once, twice, three times…...no not the song, unfortunately. Three is the number of times a hotel in Turrach, Austria was hit by hackers. The cyber criminals left a backdoor on the hotel netwo... read more

6 Scary Cybersecurity Threats Facing SMBs

6 Scary Cybersecurity Threats Facing SMBs
Although cyber attacks against large companies make the biggest headlines, small and medium-sized businesses are not immune to the threats. SMBs are just as vulnerable as large enterprises, and in many cases, more so; becaus... read more

Pros and Cons of SSL Encryption

Pros and Cons of SSL Encryption
People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations tha... read more

Quick Guide To Mobile Device Security Risks & Best Practices

Quick Guide To Mobile Device Security Risks & Best Practices
Most people are never far away from a tablet, smartphone or both. In fact, according to a Bank of America survey, more people reach for their phone first thing in the morning than a toothbrush or cup of coffee. Yet our attachment to our phones bri... read more

Top 5 Cybersecurity Predictions for 2017

Top 5 Cybersecurity Predictions for 2017
It's no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo! But while those breaches are top-of-mind and easy ... read more

To Respond or Not to Respond? 6 Phases of Incident Response

To Respond or Not to Respond? 6 Phases of Incident Response
Written By: Jeff Murphy, Security Engineer “Hmm, that’s strange.” In the scientific community these words are thought of as the immediate precursor to the ‘Eureka’ moment when something amazing is discovered. In the... read more

The 5 Ways Infogressive Protects Your Castle with Managed Security Services

The 5 Ways Infogressive Protects Your Castle with Managed Security Services
Written By: Jared Froehlich, Security Account Manager It seems that our newsfeeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away or hoping that our news filters were malfunctioning, ... read more

Penetration Test or Risk Assessment: Which One Is Right For Me?

Penetration Test or Risk Assessment: Which One Is Right For Me?
It's not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably, but the truth is, the two are very different. A Risk Assessment typically involves identifying areas of vulnerability or potential weakness, a... read more

Two Signs Your Retail Business Is Vulnerable To Cyber Risk

Two Signs Your Retail Business Is Vulnerable To Cyber Risk
The retail sector continues to struggle with ever-evolving cyber threats and cyber risk. A survey earlier this year by the global consulting firm BDO found that privacy concerns related to data breaches are considered read more

Preventing Risk In Your BYOD Healthcare Environment

Preventing Risk In Your BYOD Healthcare Environment
As the BYOD trend becomes mainstream in healthcare, it is enabling the mobile workforce to be more efficient and productive. But the benefits of the BYOD phenomenon come with their own set of risks. With healthcare now read more

Infogressive and Five Nines Partner for 1st Annual Nebraska Tech Summit

Infogressive and Five Nines Partner for 1st Annual Nebraska Tech Summit
We’re excited to be partnering with Five Nines to host Nebraska’s first annual Tech Summit in Lincoln on October 5th, 2016! Your first question is probably, “What’s the Tech Summit?” We’re answering that question and mor... read more

That’s No Moon… It’s Malware

That’s No Moon… It’s Malware
Written By: Derrick Masters, Security Engineer Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. "Oh crap. What'd they hit? Where's it going? What IS this?!" ... read more

Balancing Security and Performance in the IoT Era

Balancing Security and Performance in the IoT Era
In 2016, Business Insider Intelligence predicted there will be 34 billion connected devices, up from 10 billion in 2015. This latest prediction nearly doubles Gartner’s 20 billion connected devices prediction, but it doesn’t come close to other pr... read more

Four Tips For Creating a Strong Security Culture

Four Tips For Creating a Strong Security Culture
Brazen cyber attacks by organized crime rings and political groups against high-profile retail giants, powerful government agencies and energy facilities make news. But you may be surprised to know that the biggest risks to the cybersecurity of most ... read more

4 Threat Assessment Best Practices

4 Threat Assessment Best Practices
Cyberattacks have become commonplace across a variety of verticals —from big box stores to toymakers and even the federal government. Security staffers are feeling the pressure to ensure their company isn’t the next one splashed across the headlin... read more

How to Protect Patient Data From Network Gate Crashers

How to Protect Patient Data From Network Gate Crashers
Healthcare providers have historically taken a perimeter-focused approach to cybersecurity which is the equivalent of building a strong fence around your property to keep the cattle safe. On the ranch a fence may develop a small hole that allows a pre... read more

Why Are Healthcare Providers Underinvested in Cybersecurity?

Why Are Healthcare Providers Underinvested in Cybersecurity?
According to 2016 survey results from The Ponemon Institute, healthcare organizations average about one cyber attack per month. So why, then, do so many remain underinvested in cybersecurity? That’s a question we often ask ourselves and encourag... read more

Preventing 3rd-Party Security Breaches: A Must For Healthcare

Preventing 3rd-Party Security Breaches: A Must For Healthcare
Businesses in all sectors are increasingly relying on vendors and associates. This is especially true in healthcare, where functions such as billing are frequently performed by outside parties, and providers rely on various partners for services like ... read more

What a Successful SIEM Can’t Do Without

What a Successful SIEM Can’t Do Without
In response to increased compliance concerns and the need to protect against security breaches, more companies are implementing SIEM technology to more easily collect, correlate and analyze data and security alerts from a central location. But once a ... read more

Financial Regulators Crack Down on Cybersecurity

Financial Regulators Crack Down on Cybersecurity
ecure With the ever increasing number of financially oriented businesses, there are a lot more assets that are of value to criminals—in addition to money. This includes retail customers’ personal data as well as competit... read more

The One Thing All Secure Networks Should Have in Common

The One Thing All Secure Networks Should Have in Common
Written By: Jeff Murphy, Security Engineer The days of dividing your firewall up into three primary zones, inside, outside and DMZ are fast coming to an end. Security standards such as PCI-DSS, HIPAA, NIST and a host of others all suggest the use o... read more

5 Smart Reasons To Consider a Managed Security Service Provider

5 Smart Reasons To Consider a Managed Security Service Provider
The media is full of news when cyber attacks on big, billion dollar companies expose millions of customers' personal information. Attacks on smaller companies tend to fall under the radar screen, leading many to think they’re too small to attract ha... read more

Drinking from the SANS Fire Hose: The Finest Cybersecurity Instruction

Drinking from the SANS Fire Hose: The Finest Cybersecurity Instruction
Written By: Jeff Murphy, Security Engineer The SANS Institute is a cooperative research and education organization that reaches more than 165,000 security professionals around the world. Their programs undergo constant scrutiny and revision to ensu... read more

Privileged Accounts: Catch-22 for Network Security

Privileged Accounts: Catch-22 for Network Security
Written By: Rob Frickel, Director of Engineering Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a mali... read more

IRS: Hacked to the Third Power

IRS: Hacked to the Third Power
Written By: Derrick Masters, Security Engineer

IRS Breach Update

In May 2015 the IRS announced that they had been breached and that only about 100,000 people had been affected. A couple of months later, they said “wait…wait…Maybe that... read more

IT Professionals: Quit Buying Bad Customer Service

IT Professionals: Quit Buying Bad Customer Service
Written By: Lindsay Doll, Chief Growth Hacker Think about the last time you went to a restaurant and experienced truly terrible service. Whether you waited an hour for your food, they messed up your order, your server needed an attitude adjustment,... read more

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Pipeline Selects Justin Kallhoff for its Tenth Anniversary Class of Entrepreneurial Fellows

Pipeline Selects Justin Kallhoff for its Tenth Anniversary Class of Entrepreneurial Fellows

Justin Kallhoff of Lincoln-based Infogressive was chosen to participate in a nationally recognized year-long Fellowship designed to accelerate the growth of high-performance entrepreneurs.

Li... read more

Prepare for the Hunt – Five Practical Tips to Make Log Analysis Less Miserable with Fortinet

Prepare for the Hunt – Five Practical Tips to Make Log Analysis Less Miserable with Fortinet
Written By: Derrick Masters, Security Engineer Log analysis. It's a thing. First reactions are probably going to be "Yuck," "Make the new guy do it," "Insert expletive here," or the more common "Why? What broke now?" Everyone in IT knows that l... read more