Cybersecurity

Holding Your Security Ransom: Preparing Your Organization for Ransomware Attacks

Today’s ransom trend Today, ransomware virus cases are becoming more frequent than ever as they are raking in, on average, $450 billion dollars into the cybercriminal market annually. These unpleasant viruses leave users desperate, pressuring them into thinking that they have no choice but to pay ridiculous amounts of bitcoins…

Read More

What Penetration Tests Reveal: The Top 3 Findings

Author: Greg Johnson, Vice President of Business Development at A-LIGN. The hacking industry was alive and well in 2015, and it’s funny how the majority of attack vectors haven’t changed in the past five years. I thought it would be interesting to share…

Read More

Illusion of Insignificance: Cybersecurity and the Small Business

Author: Stuart Rorer, Senior Consultant at A-LIGN. “Big Box Store ABC Has Been Hacked, Customer Card Information Exposed!” “E-Commerce Giant Acme Inc., Suffers Cyber Intrusion” Headlines like these are appearing each day, most of which seem to apply to big box stores…

Read More

More Passwords, More Problems: A Look into Biometric Authentication

What’s your password? Studies show that you likely use more than 15 different passwords, but more than half of you admit to using a weak password. So how do companies fare with inconsistent password usage and standardization? Even companies with incredible security practices can become vulnerable due to a forgetful employee who…

Read More

2015 Data Breaches – The Year In Review

Author: Greg Johnson, Vice President of Business Development at A-LIGN. Data breach was alive and well in 2015 with some of the largest breaches in history occurring last year. The Office of Personnel Management (OPM), or in other words our Federal Government, was hacked to the tune of 21.5 million…

Read More

The Connected World: A Look At Mobile Security?

Smartphones are a truly extraordinary technology.  Like an electronic Swiss Armor Knife, they are seemingly magical devices that provide a ton of services in the palms of our hands.  Each day, it seems, a new feature emerges enabling them to do even more.  Using a smartphone a person can video conference, navigate through the perils of rush hour traffic, and download a new recipe for beef stroganoff, just hopefully not at the same time!

Read More

The State of Cybersecurity: How to Prepare For 2015

2014 was a cybersecurity eye opener for all individuals using technology.  The public and many corporations had to personally face the repercussions of the cybersecurity weaknesses throughout all technology.  The whole world was watching this year as cyber-attacks hit one after the other, arguably the worst cybersecurity incident happening in November to Sony Pictures Entertainment.  Not as popular but certainly as devastating, Heartbleed was part of the worst vulnerabilities made public and possibly the worst vulnerability ever released.

Read More

Hacking The Holidays: Protect Your Credit Card Information

Unfortunately, the Grinch is not the only one out there wishing to steal Christmas.  While the holidays generally encompass a time of joy and giving, it can also bring with its share of troubles.  It is during these times that people will most often let their guard down.  In the search for the best deal, or perfect gift, people will often overlook or forget about Internet safety precautions.

Read More

Shellshock: Are You at Risk?

By: Stuart Rorer, Senior Consultant and Penetration Tester at A-LIGN It seems with each passing day more and more vulnerabilities are being released, exposing gaping holes in the security of systems across the globe. Last week a security bulletin was released to the public that exposed a new threat,…

Read More

3 Step Guide on How To Avoid Data Breaches Through Soft Targets

By: Chris Berberich, Senior Consultant and Penetration Tester at A-LIGN In the real world of budgets and limited personnel, prioritizing security resources is a must. For the majority of companies who depend on IT resources, prioritizing information security resources is based on the significance of an asset to their overall…

Read More