Blog

11 Results / Page 1 of 2

Background

Blog Alias / May 20, 2024

Appreciate Your IT

It’s almost summer, and you know what that means! Teacher appreciation weeks, Final exams, graduations, recitals, and burnout.  But you know who works all year round and can’t afford to get burnout?  Your school IT Team! While the rest of us wind down, their work in some ways winds up: ...

Blog Alias / May 5, 2024

Passwords, Policies, People

Last week cyberprofessionals and cyberenthusiasts celebrated National Password Day. Let’s be honest. The word for National Password Day for most people is “pass.” Most people will look at all the posts and articles (including this one) about the necessity of strong passwords and how to create them and think “I’ve ...

Blog Alias / April 29, 2024

Maximizing the Impact of Penetration Testing: 5 Key Principles

In the realm of cybersecurity, penetration testing (pen testing) stands as a critical tool for assessing and fortifying the security posture of organizations. However, not all pen tests are created equal, and ensuring their effectiveness requires attention to key principles. Understanding the purpose and conduct and having shared expectations between ...

Blog Alias / April 22, 2024

Hackers’ Hall of Shame: The Top 5 Cybersecurity Facepalms

In the world of high-profile hacks, the narrative often portrays threat actors as highly skilled and almost invincible adversaries. However, the reality we’ve encountered through our incident response (IR) work tells a different story. Not all threat actors are the criminal masterminds or uber 1337 hackers that they’re made out ...

todayDecember 17, 2021

  • 396
  • 3
close

Blog Alias

L33T or Lame: A Hacker Tool Review

“Top 10 Gifts for the Hacker in Your life” articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile?  We recently sat down with two of our security engineers to talk about different gadgets and tools of the trade on this week’s ...

todayDecember 14, 2021

  • 1066
  • 3
close

Blog Alias

Hacking the Holiday: A Hacker’s Gift Guide

Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any hacker in your life. Just click on the images or the titles for a direct link to the amazon listing. ...

blue and purple gradient

todayOctober 14, 2020

  • 193
  • 3
close

Blog Alias

Learn to prevent and respond to ransomware

Ransomware has been a problem since 1989, and it’s not getting better. In fact, every eleven to fourteen seconds, a new company falls victim to this problem. Ransomware costs organizations around $20-Billion annually. But it’s not just a company problem, individuals fall victim to this threat as well. You need ...