Mar 8, 2022 | Information Security
Original Author: Hunter Gregal Updated By: Justin Fimlaid ***NOTICE*** To those reading this… 3/8/22: I think *most* of this information is still good but please be cognizant of the Ubuntu version numbers. There’s some great comments at the bottom about...
Jan 18, 2022 | Cybersecurity, Information Security, Podcast
Podcast: Play in new window | DownloadSubscribe: Google Podcasts | Spotify | Stitcher | Email | TuneIn | RSS | MoreWelcome back to season 3 of Pwned! In this Breach of The Week episode, Justin and Jack cover the base and the wind up of the log4j vulnerability exposed...
Nov 4, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! 2021 was an action-packed year for cybersecurity, from ransomware to phishing, attacks were on the rise. With the new year approaching, it is important to start planning for defenses ahead of time based on what is already known about the...
Oct 27, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! What is Cyber Safety? Being online exposes us to criminals and individuals with ill intent. Cyber safety is the practice of being safe online. It is a complex set of ideas and practices that culminate to achieve a common goal. This goal...
Oct 12, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! Phishing attacks can affect individuals and organizations and are among the most common methods hackers use to attack accounts and networks. Over the years, they have become more sophisticated and challenging to detect. According to...
Oct 6, 2021 | Cybersecurity, Information Security
Need Help? Contact an Expert! Why You Should Secure Your Devices Human error is the weakest link in cybersecurity. Individuals want to cut corners on devices they use for efficiency, especially ones that are used hundreds of times a day. Although it’s nice to open a...
Sep 29, 2021 | Compliance, Cybersecurity, Information Security
Need Help? Contact an Expert! Email is a top communication tool used by the government and is a primary threat vector utilized by attackers. Forged emails are one of the top cybersecurity threats of this time. According to CSO, phishing attacks account for more than...
Sep 23, 2021 | Compliance, Cybersecurity, Information Security
Need Help? Contact an Expert! In recent years, governments around the world have begun to endure increasingly more complex and expensive cyberattacks. The United States is chief among them and in 2018 exceeded more than 13.7 billion dollars paid due to cybercrime....
Sep 15, 2021 | Compliance, Cybersecurity, Information Security
Need Help? Contact an Expert! The Cybersecurity Maturity Model Certification (CMMC) is the new cyber security framework from the Department of Defense (DoD). CMMC aims to better protect controlled unclassified information (CUI) and mitigate risks posed to the DoD’s...
Aug 30, 2021 | Cybersecurity, Information Security, REDSEC
Need Help? Contact an Expert! Penetration Testing Penetration Testing, also known as “pen testing,” is an exercise in testing an organizations cyber security posture. While not the only step in securing an organization, it is a critical one that should not be...