The Concerning Risks Of Open Source Assessment Tools

It’s all around you, so you start to accept the risks. But just because open source software is everywhere doesn’t mean it’s the right choice for you and your organization. You’ve probably encountered it in your everyday life; with names like VLC Media Player, GIMP, and Audacity in the game, open source software (OSS) is […]

Bolstering Security For Small To Midsize Businesses

Public health isn’t the only thing at risk amid the COVID-19 pandemic. For cybercriminals capitalizing on the chaos, small to midsize businesses, or SMBs, are the perfect gambit: smaller firms are less likely to believe themselves an “attractive” target for cyberattacks, which leads them to slack on cybersecurity protections. It’s easy to be lulled into […]

Next Up on the Ransomware Hit List? Cities

Usually, ransomware makes headlines when huge corporations or organizations are held captive. There’s the implicit threat of compromised data if the corresponding ransom isn’t paid or backups aren’t in place. It’s bad, but its impact on the average person can seem muted. What happens when the cybercriminals behind ransomware attacks set their sights a little […]

The Hidden Flaws

Cyber attackers are known for their persistence. If they hit a pothole trying to break into your IT network, they won’t just give up and move on to their next target. Instead, they’ll redouble their efforts and probe your infrastructure, looking for new ways to grab your valuable data. Unfortunately, sometimes these vulnerabilities can be […]

Anonymous FTP: Crippling Healthcare Organizations

If you’ve ever had to share a large number of files with people working remotely, odds are you’ve used a file transfer protocol (FTP) server to accomplish this. It’s an easy way that you and others can access and upload information with a username and password, without taking up your own valuable internal storage space. […]

Many Banks And Credit Unions Fail The Vulnerability Testing Component Of Their IT Security Audit Due To Weak Patch Management

Do you have a patch management plan?  If so, how effective is it?  Many companies either lack a comprehensive plan or the necessary tools to properly automate the processing of updates.  In fact, the underlying reasons many banks and credit unions fail the vulnerability testing component of their IT security audit is this lack of […]