<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

WHITEBOARD WEDNESDAY: Major Equifax Breach

The recent breach reported by Equifax is massive, with more information surfacing all the time. When something like this happens, we hear a lot of questions from concerned individuals, such as:
Posted on September 20, 2017

WHITEBOARD WEDNESDAY: Good vs Bad

When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives and bankrupted businesses. 

What about White Hat Hackers? Or Gray Hat Hackers? The world needs hackers who are on our side.

Posted on September 06, 2017

WHITEBOARD WEDNESDAY: Strong Passwords

Passwords are important, they are the equivalent to your house keys, car keys or even your debit card. Having strong, secure passwords is critical.

Posted on August 30, 2017

WHITEBOARD WEDNESDAY: Traditional vs Advanced Malware Prevention

Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.

Posted on August 23, 2017

WHITEBOARD WEDNESDAY: Are You A Target?

When you think about organizations that have experienced a data breach, what are the first ones that come to mind? If you’re like most people, chances are your answers were likely Target, Home Depot, The IRS, Anthem Blue Cross, or any of the other big-name breaches that have occurred in the last few years.

Posted on August 16, 2017

WHITEBOARD WEDNESDAY: MSP vs MSSP

It seems like there’s always a new buzzword or acronym emerging in the IT and Cybersecurity industries. It can be tough to keep up on what they are and what they mean. The differences between a Managed Services Provider (MSP) and a Managed Security Services Provider (MSSP) are sometimes difficult to decipher.

Posted on August 09, 2017

WHITEBOARD WEDNESDAY: Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered. 

Posted on August 02, 2017

WHITEBOARD WEDNESDAY: Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

Posted on July 26, 2017

WHITEBOARD WEDNESDAY: The Basics of Keylogger Protection

As a cybersecurity professional, chances are that having a keylogger installed on any of your company’s machines is one of your worst case scenarios. Once a keylogger is installed, nothing is sacred. Passwords, proprietary information, and banking credentials are just a few of the many things that are now known to hackers.

Posted on July 19, 2017

WHITEBOARD WEDNESDAY: Flat vs Segmented Networks

The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.

Follow along in this week’s Whiteboard Wednesday video as our CEO, Justin Kallhoff, discusses the differences between a flat and segmented network. 

Posted on July 12, 2017

WHITEBOARD WEDNESDAY: Social Engineering 101

Every Wednesday our engineers take on a new cybersecurity topic as part of our Whiteboard Wednesdays series. At Infogressive we spend a lot of time breaking into our clients’ networks as part of our Penetration Testing services. A major component of our methodology involves social engineering.

Posted on July 05, 2017

WHITEBOARD WEDNESDAY: What does a hacker look like?

 

Posted on June 28, 2017

TOP ARTICLES:

QUESTIONS?