Blog

Cyber Penetration Testing: Not Elon Musk Science

Do you think Elon Musk is designing a new Tesla model or SpaceX rocket without considering that his new technology must have the best systems security? When you are the top leader in your industry, even in technology innovation, someone will always try to negatively impact your brand, or steal your secrets. You better believe every piece of software or hardware designed into Musk’s products or creations is tested for vulnerabilities and defects. This is one of the reasons why …
Read More »


Dark Web – Your Credentials Are For Sale

  We all know end user behavior is predictable, which makes their passwords pretty easy to figure out. How is this possible and know for certain? Think about the number of websites, applications, systems, social media sites you use on a daily basis that requires you to enter a username and password. Everyone knows individual passwords are common and very rarely change beyond a handful of complex and probable variations.


IT Vulnerabilities are here to stay

Don’t know how to identify vulnerabilities across so many platforms, applications, or appliances? Well you’re not alone. It’s a very common question and concern we often here from new clients. Why you ask? Well any IT professional can tell you risk can be elusive with so many complex infrastructure components, and in some cases these systems are not easy to integrate into your monitoring, SIEM, service desk solution.


Managed Security Service Providers (MSSP) – Why Enterprises Are Choosing this Cost Effective Cyber Defense

There’s a shift taking place in the cyber security model—driven by the massive quantities of data required to remain competitive and the need to share that data and secure it against cyber threats. Many companies are finding that managed security services are providing a solid solution to these changing dynamics. Powered by WPeMatico


NEXT GENERATION (NexGen) FIREWALLS — A DIFFERENT PERSPECTIVE ON ENDPOINT PROTECTION

Cyber criminals continue their onslaught of attacks with tactical methods constantly changing to evade capture. The statistics tell the story. Eighty-seven percent of IT security professionals surveyed reported their organizations have experienced at least one breach within the past 12 months.1   Powered by WPeMatico


SMBs TIME TO IMPROVE ENDPOINT SECURITY — OR PAY THE CONSEQUENCES

  Small- and medium-sized businesses (SMB), cyber security protection must be a top priority. Here’s why. 55% of SMB’s surveyed revealed that their companies had experienced a cyber attack in the past twelve months, and half had experienced data breaches involving customer and employee information in that same time frame according to a Ponemon Institute survey.1  Powered by WPeMatico


Cyber Threat Alert: Emerging Cyber Threats and Cyber Security Issues

  The DefendEdge team is constantly monitoring the cyber threat landscape. We have identified two emerging threats and a cyber security issue of particular concern, and are calling them out so you can take proactive steps to protect you organization. Below you will find a brief description of each individual threat, as well as links to resources that offer more information regarding the threat. Powered by WPeMatico


Cyber Threat Alert: National Lottery Hacked, Likely Stolen User Name and Password to Blame

  It’s happened again. This time the National Lottery was hacked by cybercriminals. The accounts of more than 26,500 lottery players were compromised, according to a recent Infosecurity Magazine article. 1 Powered by WPeMatico


3 Strategies in Selling your Information Security projects

By Advisory Team   With the latest and continued cyber-attacks, analysts, engineers, managers, and executives are scrambling to deploy solutions that will remedy their world, especially if they have an audit right around the corner. However, available resources – whether funding, people, or competing projects – are often the biggest challenges in any company, so don’t worry; you are not alone. Here are three successful and proven strategies we have used to help our clients prioritize projects.   Auditors Can …
Read More »


When will You be Breached?

By Advisory Team   For the last several years we have seen dozens if not hundreds of companies fall victim to some level of data breach. Those data breaches cause reputation damage, the company is often fined and/or is financially responsible to remediate customer impact, people lose their jobs, or even worse, the company is faced with a lawsuit. Data exposure is inevitable, so how your company responds is crucial to its success in overcoming it.   The Sky is …
Read More »