by Michele Dietrich | Jun 30, 2020 | Blog
Business losses due to cybercrime is expected to top $5 trillion by 2024 and the threat this poses to the Defense Industrial Base (DIB) is alarming. With over 300,000 businesses and organizations that make up the DIB, a cyber-attack could result in devastating losses...
by Peter Dietrich | Jan 9, 2020 | Case Study
Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
by Perry Lynch | Jan 3, 2020 | Blog, CIS Critical Security Controls
4:00 min read | The CIS controls have covered basic network practices, user and account management, software protection, hardware issues, and human concerns. In the end, the question remains, do these measures adequately prevent or combat hostile actions? Being...
by Perry Lynch | Nov 8, 2019 | Blog, CIS Critical Security Controls
3:35 min read | Flaws in software can leave your information systems vulnerable to attacks. Information about bugs in popular commercial and open-source software is available to everyone. Attackers exploit them once they’re known, so keeping up with patch...
by Peter Dietrich | Aug 9, 2018 | Blog, CIS Critical Security Controls
3:30 min read | Vulnerabilities on Internet connected systems are targeted on a daily basis. The fourth CIS control addresses the need to keep them protected. “Continuous Vulnerability Assessment and Remediation” addresses keeping up with and fixing newly...