Profile cover photo
Profile photo
SecurityMetrics, Inc.
119 followers -
Secure What's Important.
Secure What's Important.

119 followers
About
Posts

Post has attachment
"A high percentage of #DataBreaches could have been prevented through regular scanning and remediation" -Matt Glade (QSA, CISSP)

Post has attachment
"...they found evidence that the hackers had attempted to filter their collection of backdoored victim machines to find computers inside the networks of 18 tech firms, including Intel, Google, Microsoft, Akamai, Samsung, Sony, VMware, HTC, Linksys, D-Link and Cisco itself....Now we know this was being used as a dragnet to target these [companies] worldwide...to get footholds in companies that have valuable things to steal"


http://ow.ly/SskR30fl4RR

Post has attachment
The software engineer said it only took 20 minutes to build an exact copy of Equifax's website. It cost him $15 for domain hosting and server maintenance. Sweeting said he did it to teach Equifax a lesson about its vulnerable URL and how easy it was to spoof.


http://ow.ly/2YM430fkDJw

Post has attachment
Nick http://ow.ly/O8VX30fkChS Sweeting talks about the spoof website he created in the midst of the Equifax breach.
"The software engineer said it only took 20 minutes to build an exact copy of Equifax's website. It cost him $15 for domain hosting and server maintenance. Sweeting said he did it to teach Equifax a lesson about its vulnerable URL and how easy it was to spoof."

Post has attachment
"HIPAA and security compliance is definitely the most confusing part of my job, but SecurityMetrics took the time to break it down and make it easier for me to put a plan in place. Now our practice is on the road to compliance. If you're not working with SecurityMetrics yet, you should be." - Joanne Lynch, Fredericksburg Foot & Ankle Center https://www.securitymetrics.com/hipaa

Post has attachment
You need a pentest. Ethical hacking is a great way to discover where your business security fails.


blog.securitymetrics.com/2015/04/penetration-test-cost.html

Post has attachment
Yep. Just what it says. After a week of tech news bummers, we need this.



http://ow.ly/Lg0Q30fbXce

Post has attachment
Use any Apple products? Some points to consider from Wired's Andy Greenberg.

"Differential privacy isn't a simple toggle switch between total privacy and no-holds-barred invasiveness. And a new study, which delves deeply into how Apple actually implements the technique, suggests the company has ratcheted that dial further toward aggressive data-mining than its public promises imply."

http://ow.ly/9YSq30fbXrv

Post has attachment

Post has attachment
Nearly half of all Americans are affected by a cyber security breach at Equifax, one of the nation's three major credit-reporting agencies. Here's how to avoid being a victim.
Wait while more posts are being loaded