(402) 261-0123


Learn more news

Archives for Category: Channel Top Resources

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… and didn’t stay up to date on vulnerabilities and patching. His lack of situational awareness led to what he initially viewed as a brief operational interruption, but has now come to und...

Don’t Get Hooked! 7 Signs of a Phishing Email

it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon's 2017 Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user-level will keep you and your company safe. Here are the top 7 signs of a phishing email to watch out for:

Penetration Test vs. Risk Assessment? Follow Our Flowchart to Find Your Answer

It's not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably. The truth is, the two are very different. A risk assessment typically involves
  • Identifying areas of vulnerability or potential weakness
  • Providing a roadmap to a...