by Peter Dietrich | Jan 9, 2020 | Case Study
Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
by Perry Lynch | Sep 2, 2019 | Blog, CIS Critical Security Controls
3:20 min read | Security Awareness Training is one of the most cost-effective ways to improve your organization’s overall security posture. Most breaches are at least partly due to human error, and while nothing can be done to completely eliminate errors, a good...
by Peter Dietrich | Sep 14, 2018 | Blog, CIS Critical Security Controls
3:30 min read | A compromise of any account is a problem, but it’s especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message...