Resources

Blog

How Cyber Weaknesses Lead to Empty Shelves: An Offensive Security View

Empty grocery shelves can be caused by natural disasters, wars, and trade embargoes, as we’ve seen in recent years. But they can also be the result of successful cyberattacks, which could be more preventable than the other three agents of chaos. Whether a company sells computer chips or potato chips, if the logistics of production, distribution, or sale are disrupted, shelves will remain empty...
Blog

Jingle Bells, Retail Sells, Attacks Are on the Way (Part 1)

It’s that time of year where retail booms as the world goes shopping for gifts during the holiday season. It’s a time for retailers to shine. But, it’s also the time where retailers are most vulnerable to security risks as bad actors gear up to target them. In this two part series, we will discuss things retailers should consider this holiday season to better secure themselves from attacks and to...
Blog

Students Safely Using Devices on Networks: Home, School and Business

The integration of technology in classrooms has changed school environments tremendously. It seems as if each year at earlier ages, students are more comfortable using a tablet than putting pen to paper. However, there’s more to be concerned with than kids growing up with poor penmanship. As we all know in the world of cyber security, no one is exempt from being the next victim of an attack. What...
Blog

How Penetration Tests Protect Your Retail Business

Retail is arguably the leader in terms of the most financial transactions executed in an industry. With that in mind, the retail industry also makes up 8% of all data breaches. It may feel nerve-racking to both work and participate in such a risk dense environment. However, if you have the right security measures in place and remain aware of other’s security breaches and best practices you may be...
Case Study

Large Midwestern University

Overview Core Impact helped this large Midwestern University: Improve security holistically Find client side vulnerabilities Test web applications Ease PCI compliance