How to avoid a ransomware attack

Computer Security

Ransomware is a major security threat, three companies alone in 2017 identified $700 million worth of damage from recent attacks, and the global damage is assessed to be exponentially higher. Businesses recognize the severity of the threat, and now need to develop strategies to minimize their risk. The first step is a thorough diagnosis of […]

Vulnerability assessment vs. penetration testing

Even in professional circles, there often seem to be differences of opinion over the value of Vulnerability Assessment versus that of Penetration Testing. This can lead to gigs with over-prescribed scopes, resulting in poor value to the client. Let’s talk about the differences between the two and why each is important in an effort to, […]

What you need to know about IoT hacking and medical devices

Some pretty frightening news has come out of the healthcare industry in recent months related to cyberattacks and medical devices. A legal case is now underway questioning the safety of cardiac implants used by a large U.S. hospital. A lawsuit claims the devices are vulnerable to potentially life-threatening cyberattacks. The OneTouch Ping insulin pump has […]

One key step to protecting at-risk enterprise applications

StrikeForce penetration testing CSC Blogs

Cybercrime is growing, and the perpetrators are becoming more sophisticated. Worse, they’re getting really good at networking – sharing techniques, code and successes that can multiply the effects of an attack exponentially. Just last month, the huge Mirai attack launched a bot army of IoT devices on critical Internet infrastructure that supports big-name websites such […]