Cyber Security Articles & News

What Is a Social Engineering Attack — The Basics

Social engineering is one of the most popular techniques used in cybercrime today. In fact, Firewall Times reports that, “98% of cyber attacks involve some form of social engineering.” Why is social engineering effective against even the most secure organizations? It’s simple. Social engineering tactics take advantage of our inherent kindness and trusting nature to benefit the people-savvy hacker — the social engineer. 

Read More >
10 Reasons Why Your Organization Needs Penetration Testing

Suffering a data breach can be one of the most financially devastating events to happen to your organization — period. According to CNET, the data breach of T-Mobile in July of 2021 will cost the company $350 million dollars in payouts. 

Read More »
3 Results From Your Penetration Testing Report That May Surprise You

There are several steps you can take to protect your organization from threat actors, but how do you know if your cybersecurity posture is strong enough? Penetration testing — a simulated cyber attack performed by experts — is crucial when it comes to assessing your network’s vulnerabilities. 

Read More »
4 Steps for Successful Network Penetration Testing

Organizations are becoming more aware of cybersecurity threats, and are working to strengthen their security posture through routine scans and employee training. Unfortunately, reported data breaches increased by 14% during the first quarter of 2022 compared to last year. With threat actors becoming more bold, it’s crucial to understand where you stand against them through the use of network penetration tests.

Read More »
The Difference Between Internal and External Penetration Testing & When To Consider Both Options

Although routine scans and assessments are necessary to identify surface-level vulnerabilities, it’s crucial to get a holistic view of your organization’s security posture through in-depth testing. 

Read More »
Entering the Metaverse for Your Virtual Cyber Security Events

Virtual events can utilize virtual reality (VR) and the Metaverse so you can host a memorable event that also trains your attendees in all things cybersecurity. 

Read More »
Does Kevin Mitnick Still Hack?

Kevin Mitnick is best known for some of his earlier hacks on Motorola and other enterprise companies that earned him a spot on the FBI’s most wanted list. But contrary to the dark, low-brow cybercriminal the media and law enforcement portrayed him as, Kevin’s breaches were never carried out to cause harm. 

Read More »
The Most Common Social Engineering Techniques We’re Seeing This Year

With today’s available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain system control of organizations. Not surprisingly, 98% of cyber attacks involve social engineering tactics. 

Read More »
10 Things That Could Happen if You Don’t Conduct an External Penetration Test

Incorporating a range of assessments — including penetration testing — as a part of your security process can provide your team with confidence against cybersecurity threats now and in the future. 

Read More »
4 Reasons Why Internal Network Penetration Testing Is Vital to Your Business

Although vulnerability scans and assessments are crucial for maintaining a strong cybersecurity posture, penetration testing goes beyond the routine to thoroughly test your organization against potential security threats. There are 6 main types of penetration tests that can be performed:

Read More »