by Peter Dietrich | Feb 14, 2020 | News
Anchor Technologies will participate in the RSA Conference this year! We will be in the expo at booth 5355. This booth and conference will serve as the official launch for the myCYPR™ cybersecurity ratings platform. myCYPR™ is the COMPLETE cybersecurity ratings...
by Peter Dietrich | Jan 9, 2020 | Case Study
Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
by Peter Dietrich | Feb 18, 2019 | Blog, CIS Critical Security Controls
3:45 min read | In the event of a security breach of your network, it is likely that the attackers have altered or destroyed important data and security configurations. The tenth CIS control, data recovery capabilities, addresses the importance of backing-up system...
by Peter Dietrich | Jan 3, 2019 | Blog, CIS Critical Security Controls
4:00 min read | Transmitting and receiving data via network ports is a necessary evil. Because your network process uses a specific port to communicate to another port there is no avoiding the inherent risk. The most perilous services on a network are the ones you...
by Peter Dietrich | Dec 11, 2018 | Blog, CIS Critical Security Controls
4:30 min read | Malware is a type of computer program designed to infect a legitimate user’s computer with the intent to inflict harm. Malware comes in various forms such as, viruses, Trojans, spyware, worms, etc. Malware is a huge and growing problem, costing...