Latest Blog Posts

1311, 2018

Penetration Test vs Vulnerability Assessment

By |November 13th, 2018|

One of the most common issues we (and consultants at other consulting firms) experience is the fact that many individuals do not understand the difference between a vulnerability assessment and penetration test. This could result in an organization not receiving the maximum value [...]

110, 2018

Cybercriminals are still targeting RDP services

By |October 1st, 2018|

It is still all too common to find unnecessary services and protocols that are public-facing on the internet. In many cases, these services are exposed by accident, such as through a misconfiguration, or even intentionally. In recent months, attackers have been utilizing Remote [...]

2709, 2018

Exploiting the Human Factor

By |September 27th, 2018|

Many years later, social engineering is still one of the most powerful tools in the arsenal when it comes to gaining access to sensitive data and critical systems within an organization. The premise behind social engineering is to exploit the human factor.  [...]

1107, 2018

What is WPA3 and What Do I Need to Know?

By |July 11th, 2018|

TL;DR: Refer to our knowledge base article to learn more about WPA3. On June 25, 2018, the Wi-Fi Alliance officially launched the third revision of Wireless Protection Access (WPA), WPA3 [1]. The purpose of WPA3 is to provide additional security and a better [...]