708-593-3516
Secure Compliance Solutions
  • Home
  • Services
    • Advisory
      • CMMC
      • Compliance Auditing
    • 24×7 Security Monitoring SIEM
    • Penetration Testing
    • Security Awareness Training
    • Vulnerability Assessment
  • Blog
  • About Us
  • Contact Us
Menu

    General Teleworking Tips

    2020-10-20 Security Tools, Tips, and Techniques by Austin Songer Leave a Comment on General Teleworking Tips
    General Teleworking Tips

    Develop and enforce a telework security policy, such as having tiered levels of remote access. Require multi-factor authentication for enterprise access. Use validated encryption technologies to protect communications and data stored on client devices. Ensure […]

    Read More

    Microsoft “Zerologon” Elevation of Privilege Vulnerability (CVE-2020-1472)

    2020-09-20 Vulnerability by Austin Songer Leave a Comment on Microsoft “Zerologon” Elevation of Privilege Vulnerability (CVE-2020-1472)

    “An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run […]

    Read More

    GlueBall Vulnerability (CV-2020-1464)

    2020-08-20 Vulnerability by Austin Songer Leave a Comment on GlueBall Vulnerability (CV-2020-1464)

    Microsoft finally patched a zero-day that has existed for years named “GlueBall” (CV-2020-1464: Windows Spoofing Vulnerability). A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass […]

    Read More

    Managing Remote Workers during COVID-19

    2020-07-20 Security Tools, Tips, and Techniques by Austin Songer Leave a Comment on Managing Remote Workers during COVID-19

    During the COVID-19 Pandemic, many companies have been required to set-up their employee base to work remotely. This includes not only employees, but also contractors, business partners, vendors, and other users to perform work from […]

    Read More

    Antivirus and Endpoint Detection & Response Systems

    2020-06-20 Security Tools, Tips, and Techniques by Austin Songer Leave a Comment on Antivirus and Endpoint Detection & Response Systems
    ANTIVIRUS AND ENDPOINT DETECTION AND RESPONSE SYSTEMS

    Antivirus software is designed to detect and remove malware; malware is the broad term used to describe all kinds of malicious or unwanted code. Antivirus solutions are installed on individual devices such as desktops, laptops, and […]

    Read More

    What is Ransomware & Recent Attacks

    2020-05-20 Security Tools, Tips, and Techniques by Austin Songer Leave a Comment on What is Ransomware & Recent Attacks
    What is Ransomware and Recent Attacks

    Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Users are usually showed instructions for how to pay a fee to get the decryption key.

    Read More

    150MM Account Credentials Stolen from MyFitnessPal

    2018-04-02 Blog, Data Breaches, Hacks, and Thefts by Mark Rudnitsky

    The Under Armour subsidiary MyFitnessPal has officially confirmed the theft of account data for over 150 million users. The MyFitnessPal Hack In February 2018, unknown actors accessed the protected data of MyFitnessPal (MFP), a fitness […]

    Read More

    A Quick Linux Server Hardening Checklist

    2018-03-26 Blog, Security Tools, Tips, and Techniques by Mark Rudnitsky
    Read More

    GDPR for the Rest of Us

    2018-03-23 Blog, Compliance and Legal by Austin Songer

    In the days following the latest Facebook scandal, in which we learned that Cambridge Analytica collected and misused the personal data of potentially 50 million American Facebook users, we have seen: A large social media […]

    Read More

    GitHub Hit with Largest DDoS in History

    2018-03-20 Attacks, Blog by Mark Rudnitsky

    On February 28th, 2018, GitHub reported that it experienced the largest DDoS attack on record, with a maximum volume of 1.35Tbps. The GitHub Attack Process Many applications use a memory caching system called “memcached“. Administrators […]

    Read More

    Posts navigation

    Previous 1 2 3 … 5 Next

    Recent Posts

    • Increasing Security through Network Segmentation
    • How to Prevent Ransomware
    • Best Practice in Security Layers
    • Vulnerability Scanning Vs. Penetration Testing
    • What is Penetration Testing?

    Recent Comments

      Archives

      • November 2021
      • October 2021
      • December 2020
      • November 2020
      • October 2020
      • September 2020
      • August 2020
      • July 2020
      • June 2020
      • May 2020
      • April 2018
      • March 2018
      • February 2018
      • January 2018
      • December 2017
      • November 2017
      • October 2017
      • May 2017
      • January 2016
      • November 2015
      • October 2015

      Categories

      • Attacks
      • Blog
      • Business Operations
      • Compliance and Legal
      • Data Breaches, Hacks, and Thefts
      • Penetration Testing
      • Research
      • Security Tools, Tips, and Techniques
      • Uncategorized
      • Vulnerability

      Meta

      • Log in
      • Entries feed
      • Comments feed
      • WordPress.org

      Categories

      • Attacks 9
      • Blog 32
      • Business Operations 1
      • Compliance and Legal 6
      • Data Breaches, Hacks, and Thefts 9
      • Penetration Testing 1
      • Research 9
      • Security Tools, Tips, and Techniques 15
      • Uncategorized 4
      • Vulnerability 8

      Company

      About Us
      Privacy Policy
      Terms and Conditions

      Contact Us

      • 4415 Harrison St, Ste 504
        Hillside, IL 60162
      • 708-593-3516

      Site Map

      Vulnerability Management
      Penetration Testing Services
      24/7 Security Operations Center (MSSP)
      Security Awareness/Social Engineering