<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

5 Need-To-Know Cybersecurity Statistics for 2019

Understanding cybersecurity can be complex in today's constantly-evolving threat landscape. With every new advancement in technology comes a new opportunity for hackers, a new avenue for attack, and a new vulnerability to be exploited.

Posted on January 04, 2019

Families are Targets, Too: 5 Home Cybersecurity Tips

It’s not just big businesses that are at risk of being hacked or cyber-attacked.

It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in your home to give your family some peace-of-mind online:

Posted on October 24, 2018

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.”  After all this research, we have a team put together and have partnered with a platform we believe in, allowing us to be able to offer this...

Posted on October 23, 2018

5 Easy Ways to Improve Your Cybersecurity at Work

 

It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity.

Whether you know it or not, cyber criminals see you, the end user, as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself from some of the most common threats. Follow these easy tips to eliminate many of the everyday security threats...

Posted on October 15, 2018

MSP vs Hacker: Penetration Test Demo

We all know that security is hard… for an MSP, it’s even more difficult.

In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, customer networks take precedence and MSP’s in-house security falls short.

Posted on October 03, 2018

10 Mistakes that Will Get You Hacked

Sometimes, it's the little things that make a big difference.

This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:

Posted on September 06, 2018

Business Email Compromise: What is it, and How Can it Affect Me?

 You may have heard the statistic: 91% of breaches start with email. But you’re probably thinking, that won’t happen to me

You know the signs of a phishing email and you avoid emails that are clearly unsafe, so, of course, you’re not going to be the one who gets breached. Or are you?

Posted on August 10, 2018

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril.

Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… 

Posted on July 27, 2018

Scam Alert: Sextortion Email Using Real Passwords

In the past 48 hours, security operators have seen a new ‘sextortion’ message begin popping up in client inboxes almost everywhere.

 The most frightening part of this message is that it lists a password either in the subject line or the first sentence. 

Posted on July 13, 2018

GDPR: Is Your Cybersecurity Strategy Ready?

If the GDPR affects your business, you may need to make some significant changes to your cybersecurity strategy. Here are four core areas to address in order to achieve technical compliance with the GDPR.

 

Posted on May 09, 2018

A Simple Guide to Online Privacy and Protecting Your Identity

It is easier than ever for cyber criminals to obtain your private information, especially when “trustworthy” sites are the ones putting it on the line.

Follow these simple steps to ensure you’re doing what you can to keep your information safe at work and at home:

 

Posted on April 02, 2018

Analysis of a DocuSign Phishing Email

As an MSSP, we offer a number of services. It’s kind of in the name. Two of those services involve email through both email security as well as end-user education through our phishing service.

Over the last couple of weeks, we’ve noticed an uptick in phishing emails that are using fake DocuSign sites to attempt to steal credentials to user email accounts.

Posted on March 18, 2018

Don’t Get Hooked! 7 Signs of a Phishing Email

You may not realize it, but your computer, mobile devices, accounts, and information all have value to cyber criminals.

According to Verizon’s 2017 Data Breach Report, 91% of company breaches start with an email. 

 Knowing how to maintain email security at the user-level will keep you and your company safe. 

Posted on March 06, 2018

Into the Rabbit Hole: A Security Engineer’s Review of SANS FOR508

Infogressive’s engineers are a special kind of broken. We like to learn and put ourselves through things that are REALLY hard just because we’re curious… (and a little masochistic).

 

When I was new to the company, I shadowed on an Incident Response lead by one of our vendor partners, and was introduced to the world of forensics. 

Posted on March 05, 2018

Healthcare Case Study - Malware on Surgical Laser

This is one of those case studies that gives you goosebumps thinking about the current state of cybersecurity in the healthcare industry. For example, a medical laser being infected by malware. Read on for the details.

Posted on February 12, 2018

TOP ARTICLES:

QUESTIONS?