708-593-3516
Secure Compliance Solutions
  • Home
  • Services
    • Advisory
      • CMMC
      • Compliance Auditing
    • 24×7 Security Monitoring SIEM
    • Penetration Testing
    • Security Awareness Training
    • Vulnerability Assessment
  • Blog
  • About Us
  • Contact Us
Menu

    Best Practice in Security Layers

    2021-10-28 Uncategorized by jsadmin Leave a Comment on Best Practice in Security Layers

    Security layers are Security Best practice. No one type of security provides a complete security solution. This report focuses on network segmentation. The separation of critical networks from the Internet and other internal, less sensitive […]

    Read More

    Managing Remote Workers during COVID-19

    2020-07-20 Security Tools, Tips, and Techniques by Austin Songer Leave a Comment on Managing Remote Workers during COVID-19

    During the COVID-19 Pandemic, many companies have been required to set-up their employee base to work remotely. This includes not only employees, but also contractors, business partners, vendors, and other users to perform work from […]

    Read More

    A Quick Linux Server Hardening Checklist

    2018-03-26 Blog, Security Tools, Tips, and Techniques by Mark Rudnitsky
    Read More

    Getting Ready for GDPR – A Critical Activity Checklist

    2018-02-16 Blog, Compliance and Legal by Austin Songer

    The implementation deadline for the European Union General Data Protection Regulation (GDPR) is coming soon.  Most of us in the US are probably not yet ready for the potential business impact of the new European […]

    Read More

    A Personal Data Checklist for Data Protection Day

    2018-01-29 Blog, Security Tools, Tips, and Techniques by Danielle Acuña Leave a Comment on A Personal Data Checklist for Data Protection Day

    Check out Danielle’s related post for small- to medium-sized enterprises. January 28th is Data Protection Day in the United States and Europe.  The celebration of this day is the anniversary of “the signing of the […]

    Read More

    Protecting Your Business on Data Protection Day

    2018-01-29 Blog, Security Tools, Tips, and Techniques by Danielle Acuña Leave a Comment on Protecting Your Business on Data Protection Day

    Check out Danielle’s related post for individuals and families. January 28th is Data Protection Day in the United States and Europe.  The celebration of this day is the anniversary of “the signing of the Council […]

    Read More

    Nicehash Confirms Theft of Bitcoin

    2017-12-14 Blog, Data Breaches, Hacks, and Thefts by Mark Rudnitsky Leave a Comment on Nicehash Confirms Theft of Bitcoin

    Nicehash, the cryptocurrency mining company, has confirmed the theft of over 4,736.43 Bitcoin, worth over $75 million at today’s prices. What We Know On Wednesday, December 6th, the Nicehash team reported that someone had compromised their […]

    Read More

    Security Tech Today: Monero

    2017-10-30 Blog, Security Tools, Tips, and Techniques by Mark Rudnitsky Leave a Comment on Security Tech Today: Monero

    From time to time, we at SCS like to discuss newer or lesser-known security technologies, bringing them into the light to use them – or to protect against them. Today, we’ll be discussing Monero. What […]

    Read More

    The KRACK Attack

    2017-10-17 Attacks, Blog by Mark Rudnitsky Leave a Comment on The KRACK Attack

    The KRACK Attack Researchers out of KU Leuven recently disclosed a major vulnerability in the WPA2 protocol. The attack, known as KRACK, works by forcing the victim to reinstall an already-used key. By replaying message […]

    Read More

    Patient Records Exposed in New Breach

    2017-10-16 Blog, Data Breaches, Hacks, and Thefts by Mark Rudnitsky Leave a Comment on Patient Records Exposed in New Breach

    Patient Health Records Exposed The fun never ends in the cybersecurity world. Researchers at Kromtech Security Researchers recently disclosed the existence of yet another insecure AWS server. This time, the server stored the most sensitive […]

    Read More

    Posts navigation

    1 2 Next

    Recent Posts

    • Increasing Security through Network Segmentation
    • How to Prevent Ransomware
    • Best Practice in Security Layers
    • Vulnerability Scanning Vs. Penetration Testing
    • What is Penetration Testing?

    Recent Comments

      Archives

      • November 2021
      • October 2021
      • December 2020
      • November 2020
      • October 2020
      • September 2020
      • August 2020
      • July 2020
      • June 2020
      • May 2020
      • April 2018
      • March 2018
      • February 2018
      • January 2018
      • December 2017
      • November 2017
      • October 2017
      • May 2017
      • January 2016
      • November 2015
      • October 2015

      Categories

      • Attacks
      • Blog
      • Business Operations
      • Compliance and Legal
      • Data Breaches, Hacks, and Thefts
      • Penetration Testing
      • Research
      • Security Tools, Tips, and Techniques
      • Uncategorized
      • Vulnerability

      Meta

      • Log in
      • Entries feed
      • Comments feed
      • WordPress.org

      Categories

      • Attacks 9
      • Blog 32
      • Business Operations 1
      • Compliance and Legal 6
      • Data Breaches, Hacks, and Thefts 9
      • Penetration Testing 1
      • Research 9
      • Security Tools, Tips, and Techniques 15
      • Uncategorized 4
      • Vulnerability 8

      Company

      About Us
      Privacy Policy
      Terms and Conditions

      Contact Us

      • 4415 Harrison St, Ste 504
        Hillside, IL 60162
      • 708-593-3516

      Site Map

      Vulnerability Management
      Penetration Testing Services
      24/7 Security Operations Center (MSSP)
      Security Awareness/Social Engineering