pen testing


Last month I talked about the essential nature of third-party auditing and pen testing. It's smart security policy, good business, and, more likely than not, a regulatory requirement. The problem, though, is that it tends to be pricey, time-consuming, and invasive. Fortunately, there's a solution that's free, non-invasive, and requires very little of your time: Let a security vendor do it. I know, I can hear the protests now. "I don't want to let some vendor bring their hardware and software on my network!" Or "How... [Read More]
by RSS Chris Dawson  |  Sep 08, 2015  |  Filed in: Industry Trends
You've invested in firewalls and your servers are patched. Clients are running updated anti-malware software and spam and phishing filters are turned up to 11 on your mail servers. Flash? Not running it. Role-based security measures? Implemented three years ago...of course. And BYOD? Only with approved AV and signed acceptable use and access policies. Your IT staff actually sleeps at night because you don't just have a security plan - You actually follow it. Unfortunately, the reality for most organizations is a bit different. Smaller... [Read More]
by RSS Chris Dawson  |  Aug 26, 2015  |  Filed in: Industry Trends