Blog

Blog

How to Prepare for a DDoS Attack

“There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we think... it's all about the information!" – Sneakers Last week, another massive Distributed Denial of Service (DDoS) attack disrupted large swaths of the internet effecting both direct targets and causing collateral...
Blog

How to Spot High Risk Accounts in Your Organization

The Danger of Stolen or Misused Credentials According to the Verizon Data Breach Report over 80% of breaches were due to stolen or misused credentials. This shows us that our access credentials are more valuable than ever which means that being able to locate our high risk access accounts has become more important than ever. Do you know who has the administrative privileges to your key...
Blog

Core Impact 2016 Pro R1.1 Now Available

We are pleased to announce the official release of Core Impact Pro 2016 R1.1. More than 83 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team has been working on several privilege escalations, a number of remote exploits for widely deployed software, and numerous enhancements. This...
Blog

5 Embarrassing Mistakes Found in Penetration Tests

It is that special time of the year, Black Hat, when all of our friends are gathered together in Vegas to see just what hacks, exploits, tips and tricks there are for us to be concerned about. As a cyber-security specialist, it’s the most wonderful time of the year. However, for consumers and business owners, it is the reminder that what you thought was safely tucked away is actually only a moment...
Blog

Why Outsourcing Security Isn’t Something to be Scared Of

No matter what you call them: threats, weaknesses, risks or vulnerabilities, they’re out there. Are you ready to handle them? Do you have a team internally dedicated to conducting pen-tests regularly? Are the people you’ve hired trained and experienced in conducting pen-tests or seeking out weaknesses in your system? How about fixing or eradicating issues before they actually become problems? ...
Blog

How to Increase Password Security with Mobile Reset

Ineffective password management can be a significant burden to most organizations, resulting in increased costs and security risks. In order to ensure the security of your network, you set rules around password creation including the use of characters, symbols, minimum lengths and more. You’ve restricted the use of old passwords and instituted a process for the passwords to be changed at regular...
Blog

Tips to Better Understand Cyber-Security

2016 really made a name for cyber-security. Now let’s make 2017 the year of executing strong cybersecurity plans. In order to fight the war online, you first need to understand what it is you are actually fighting. You hear the buzzwords such as “cybersecurity,” “pen-testing” and “IoT” – but do you know the full scope of what they really mean? Where to Start As with anything, it starts with...
Blog

How to Create a Company Culture of Security

Cyber-security firms are consistently talking about securing the Internet of Things, analyzing the latest hack or trying to sell you on the latest and greatest tool. Oftentimes, this makes you look at the newest security software to put in place (which we recommend you do) or increase the number of pen-tests to ensure your systems are in optimal condition. What you may be missing is the most...
Blog

Security for Any Business Size

Let’s not fall victim to just talking about securing our businesses or people without putting action behind it. Cyber-security has grown to be a hot topic as technology advancements continue and after many cyber-attacks, breaches and panic in 2016. When hearing details about the attacks that happened to Target, Yahoo or Anthem, you can’t help but wonder if you could be next. We are not promising...
Blog

Securing Access in an Always-Connected World

How many devices do you have within your reach right now? How many emails did you answer on your cell phone, work or personal, after you got home last night? Did you watch the debate this week? How? For the first time there were live streaming versions of the debate on television, Facebook, Twitter, and on the websites of too many media outlets to count. Our lives have become insanely...
Blog

8 Tips for Penetration Testing

You think that you're safe, that your network is secure, that your firewalls are protecting you...but how will you know if you don't test it? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. You may have also hear the term "Red Hat" or "White Hat" when it comes to testing because, while they are trying to...
Blog

Core Ready to Put On its Black Hat

Core Security has more going on at Black Hat USA in 2009 than ever before, with the concept of helping customers improve their overall security standing at the center of everything we plan to do. It’s hard to believe that an entire year has passed since the ethical hacking community last convened amid the neon lights and desert sands of Las Vegas for the annual Black Hat convention, but here we...
Blog

When to Revisit a Cybersecurity Plan

We are a full three months into 2017 and hopefully you’ve remained unscathed. Have you had some things on your “to-do” list that just haven’t happened? Or maybe something didn’t work or produce as much of a “punch” as you were hoping it would? Maybe some things have served your company far better than you thought—like putting a company-wide security training in place paired with password reset or...
Blog

How to Mitigate Data Breaches in Healthcare IT

What once was only science fiction is now our reality, anything and everything can be hacked. For healthcare providers, ‘anything’ includes not only patient records and claims information, but sentient things like drug pumps and pacemakers. In addition, healthcare has operational functionality that make this space particularly challenging. The mobility challenge is particularly unusual because the...
Blog

Why You Should Pen-Test Your Applications

If testing your antivirus program or other applications sounds silly, then consider this your wake-up call. Just because you’ve bought something to protect your services, doesn’t mean it’s a surefire way to protect your data. System applications, embedded applications, games and more are not invincible either. It’s safe to assume that the protection services you have in place have loopholes that...
Blog

Students Safely Using Devices on Networks: Home, School and Business

The integration of technology in classrooms has changed school environments tremendously. It seems as if each year at earlier ages, students are more comfortable using a tablet than putting pen to paper. However, there’s more to be concerned with than kids growing up with poor penmanship. As we all know in the world of cyber security, no one is exempt from being the next victim of an attack. What...
Blog

How Pen-Testing Protects Your Federal Agency

It seems as if government agencies, both locally and nationally, are making headlines for mostly the wrong reasons these days. From scandals to breaches and cybersecurity this has become such a sensitive subject within the past year that these events have left most folks feeling even more on edge. As stated by Thales Data Threat Report, within the past year alone, 33% of government agencies...
Blog

How Penetration Tests Protect Your Retail Business

Retail is arguably the leader in terms of the most financial transactions executed in an industry. With that in mind, the retail industry also makes up 8% of all data breaches. It may feel nerve-racking to both work and participate in such a risk dense environment. However, if you have the right security measures in place and remain aware of other’s security breaches and best practices you may be...