<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

The Complete Guide to Penetration Testing

Picture this...

An employee receives a targeted phishing email and, without realizing what it is, downloads an “urgent update” for his computer. The attacker now has access to their device and is able to install a keylogger on the computer, learn more about the network, and gain domain admin access to dig even deeper.

Posted on June 18, 2019

MSP vs Hacker: Penetration Test Demo

We all know that security is hard… for an MSP, it’s even more difficult.

In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, customer networks take precedence and MSP’s in-house security falls short.

Posted on October 03, 2018

Penetration Test or Risk Assessment? Follow our Flowchart to Find Out!

It’s not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably. The truth is, the two are very different.

Posted on August 10, 2017

WHITEBOARD WEDNESDAY: Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

Posted on July 26, 2017

Starting Your Cybersecurity Strategy from Scratch? Follow these 4 steps...

If you are like most of the business owners we talk to these days, you’re likely overwhelmed with trying to effectively secure your data. We still encounter organizations starting their security from square one on a fairly regular basis, and we know it’s not an easy task. It can be tempting to get caught up in the single solution that attempts to solve all your problems with a flashy...

Posted on March 02, 2017

To Respond or Not To Respond? 6 Phases of Incident Response

“Hmm, that’s strange.”

In the scientific community these words are thought of as the immediate precursor to the ‘Eureka’ moment when something amazing is discovered. In the information technology field, specifically in security, they usually mean something bad is happening.

Posted on December 13, 2016

Preventing 3rd-Party Security Breaches: A Must for Healthcare

Businesses in all sectors are increasingly relying on vendors and associates. This is especially true in healthcare, where functions such as billing are frequently performed by outside parties, and providers rely on various partners for services like imaging and diagnostics.

Posted on July 12, 2016

TOP ARTICLES:

QUESTIONS?