<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril.

Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… 

Posted on July 27, 2018

WHITEBOARD WEDNESDAY: Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered. 

Posted on August 02, 2017

WHITEBOARD WEDNESDAY: Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

Posted on July 26, 2017

Warning Signs of a Cyber Attack

The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015.

In fact, The Business Journals’ latest SMB Insight study showed that over 550,000 small businesses are projected to fail in 2017 due to a cyber attack.

Posted on March 29, 2017

6 Scary Cybersecurity Threats Facing Small Businesses

Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to devote to cybersecurity.

Posted on January 26, 2017

5 Ways Infogressive Protects Your Castle with Managed Security Services

It seems that our newsfeeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away or hoping that our news filters were malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ever before. 

Posted on November 17, 2016

Privileged Accounts: Catch-22 for Network Security

Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is a very real and scary threat.

Posted on April 21, 2016

Prepare for the Hunt: Five Practical Tips to Make Log Analysis Less Miserable with Fortinet

Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”

Posted on January 13, 2016

TOP ARTICLES:

QUESTIONS?