Mar 8, 2022 | Information Security
Original Author: Hunter Gregal Updated By: Justin Fimlaid ***NOTICE*** To those reading this… 3/8/22: I think *most* of this information is still good but please be cognizant of the Ubuntu version numbers. There’s some great comments at the bottom about...
Nov 4, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! 2021 was an action-packed year for cybersecurity, from ransomware to phishing, attacks were on the rise. With the new year approaching, it is important to start planning for defenses ahead of time based on what is already known about the...
Oct 27, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! What is Cyber Safety? Being online exposes us to criminals and individuals with ill intent. Cyber safety is the practice of being safe online. It is a complex set of ideas and practices that culminate to achieve a common goal. This goal...
Oct 12, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! Phishing attacks can affect individuals and organizations and are among the most common methods hackers use to attack accounts and networks. Over the years, they have become more sophisticated and challenging to detect. According to...
Oct 6, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! Why You Should Secure Your Devices Human error is the weakest link in cybersecurity. Individuals want to cut corners on devices they use for efficiency, especially ones that are used hundreds of times a day. Although it’s nice to open a...
Aug 30, 2021 | Cybersecurity, Information Security, REDSEC
Need Help? Contact an Expert! Penetration Testing Penetration Testing, also known as “pen testing,” is an exercise in testing an organizations cyber security posture. While not the only step in securing an organization, it is a critical one that should not be...
Aug 18, 2021 | Cybersecurity, Information Security, REDSEC
Need Help? Contact an Expert! What is a Red Team Assessment? Uniquely designed for each organization, a red team assessment consists of a full scope, multi-layered adversarial attack simulation created to measure how well an organizations staff, networks,...
Aug 9, 2021 | Cybersecurity, Information Security, REDSEC
Need Help? Contact an Expert! A Sense of Safety Vermont’s unique geographic location provides a cozy sense of safety for many of its residents. The lack of challenges commonly faced in major metropolitan areas allows for a sense of community rife with friendly locals....
May 20, 2021 | Cybersecurity, Information Security, REDSEC
Need Help? Contact an Expert! Purple Teaming Purple teaming is a blending of offensive actions (RED) and defensive detection and validation (BLUE). The overall goal of any offensive engagement is to improve the defensive stance of an organization’s security program....
Apr 8, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! What is SaaS? SaaS, or Software as a Service, is a software licensing and delivery model based on paying a subscription fee for access to an online application. Products that fall under SaaS have a wide range of use cases and...