Latest Blog Posts

110, 2018

Cybercriminals are still targeting RDP services

By |October 1st, 2018|

It is still all too common to find unnecessary services and protocols that are public-facing on the internet. In many cases, these services are exposed by accident, such as through a misconfiguration, or even intentionally. In recent months, attackers have been utilizing Remote [...]

2709, 2018

Exploiting the Human Factor

By |September 27th, 2018|

Many years later, social engineering is still one of the most powerful tools in the arsenal when it comes to gaining access to sensitive data and critical systems within an organization. The premise behind social engineering is to exploit the human factor.  [...]

1107, 2018

What is WPA3 and What Do I Need to Know?

By |July 11th, 2018|

TL;DR: Refer to our knowledge base article to learn more about WPA3. On June 25, 2018, the Wi-Fi Alliance officially launched the third revision of Wireless Protection Access (WPA), WPA3 [1]. The purpose of WPA3 is to provide additional security and a better [...]

1306, 2018

Preparing for Your First Physical Penetration Test

By |June 13th, 2018|

A physical penetration test is an evaluation of the security controls that exist in a physical environment to prevent unauthorized access. These security controls could include the implementation of badge-controlled doors and elevators, security cameras, security guards, and even man traps. The primary [...]