Penetration testing (or pen testing) is a process by which software is utilized to probe a network and its elements for security risks. The job of security is always to focus on reducing the attack surface. Pen testing is what allows you to do this.Read More
Technium was brought in as the managed network and operations partner to get this growing biotech a proven, systematic approach to security.Read More
Finding an out-of-the-box software to resolve gaps in your current cyber security state appears easy. The hard part is ensuring the systems and people are in place to do the work.Read More
As you think about securing your business against cyber attacks, keep in mind that you’ll not only need an up-to-date system, but you’ll also need to consider keeping it current.
And the human element can be even trickier. Find out the real cost of creating an in-house security team.
The truth is that a breach will happen to your company; it’s just a matter of knowing how well you’re prepared to minimize the amount of damage it can cause.Read More
In a mobile world, it is important to conduct a risk analysis of whether a person may be a target of an attack on their phone. Here are some steps one can take to reduce the exposure to phone-based attacks, depending on the level of risk…Read More
In the aftermath of a breach, it is crucial to consider not only how to harden the environment from an IT standpoint, but also how to build a maintenance plan.Read More
Technical debt reflects the implied cost of addition rework caused by choosing an easy solution now rather than taking the time to properly plan and execute a project.Read More
Least privilege essentially means to provide access to only what is required for a user to perform their job functions and nothing more.Read More
Preparing for the Unknown Has Become a Reality Many established companies were used to going into their brick and mortar offices, and then were forced to go remote. How prepared were you for this change? We have come across a couple of scenarios to which you might be able to […]Read More