Cybersecurity Assessments | Penetration Testing
By:
Cory Rey
January 14th, 2020
The Importance of the DMARC Record - Protecting Your Domain Against Spoofing Attacks These days, it has never been easier to establish an online presence, and having your own domain is a key component of that. However, with great domain ownership comes great responsibility, as do the problems that can follow your presence. As such, when managing individual DNS records, all users should stay up to date on the latest trends with regards to safeguarding their domain’s reputation, as well as all the persistent problems that come with online communication. Spoofing is one of those age-old issues when using e-mail as a contact protocol, and when it comes to spoofing protection, Sender Policy Framework (SPF) and Domain Keys Identified Mail (DKIM) are usually identified as a consistent “best practice” standard. However, they themselves are not enough to prevent modern spoofing techniques, even if both of these DNS records are both useful in their own way.
By:
AVANI DESAI
January 9th, 2017
We all have our own ways of creating our perfect work environment.
Cybersecurity Assessments | Privacy Assessments | Penetration Testing
By:
KISHAN KUKKADAPU
September 26th, 2016
Employees are one of the weakest links in any business’ security defenses, especially if there is a lack of awareness about criminal attacks that are designed to obtain sensitive information from organizations.
By:
JOE O'DONNELL
September 1st, 2016
“We shall defend our island…we shall fight on the beaches, we shall fight on the landing grounds, we shall fight in the fields and in the streets, we shall fight in the hills; we shall never surrender.”
Cybersecurity Assessments | Privacy Assessments
By:
AVANI DESAI
August 23rd, 2016
“Scientia potentia est”. “Knowledge is power”.
Cybersecurity Assessments | Healthcare Assessments
By:
DOUG KANNEY
June 27th, 2016
In 2015 alone, 112 million healthcare records were compromised. If there’s one thing we can count on in the years to come, it would be increasingly sophisticated cybersecurity attacks that specifically target healthcare organizations. Why healthcare? Here are a few reasons.
Cybersecurity Assessments | Cloud Computing
By:
SCOTT ZELKO
March 31st, 2016
Surprisingly, business leaders—not IT departments—are the driving force behind six out of 10 migrations to the cloud. These leaders are often bothered by the nagging question, “Is the cloud secure?” This question is usually followed by a series of debates about just how secure the cloud is.
By:
DEBBIE ZALLER
January 28th, 2016
Your company has internal security measures in place, and it has met many compliance requirements. But do these things mean your business is now immune to fraud? Probably not. Research shows that 75 percent of companies have fallen victim to fraud in the last year.