Penetration Test

Vulnerability Scan vs. Penetration Test: What’s the Difference?

What is the difference between a penetration test and a vulnerability scan? Is a penetration test a vulnerability assessment? Is a vulnerability scan a penetration test? Which one does my organization need? As organizations prepare to meet their security needs, determining which service your organization requires depends on the purpose…

Read More

The Trail to Breach Prevention: Infographic

The importance of National Cyber Security Awareness Month cannot be understated. A-LIGN has highlighted statistics from the breaches that occurred in 2015 in order to portray the prevalence and potential cost of data breaches. In order to help your organization refrain from becoming another statistic, A-LIGN has provided actionable steps…

Read More

14 Ways to Prevent Data Breaches in Your Organization

Actionable Tips to Prevent Data Breaches Feeling safe about your organization’s personal data because of encryption standards? Don’t fool yourself into a false sense of security. Managing cyber-risk is a multi-faceted, whole-organization effort that requires implementation at the top levels down. In IBM’s Security Services 2014 Cyber Security Intelligence Index,…

Read More

Holding Your Security Ransom: Preparing Your Organization for Ransomware Attacks

Today’s ransom trend Today, ransomware virus cases are becoming more frequent than ever as they are raking in, on average, $450 billion dollars into the cybercriminal market annually. These unpleasant viruses leave users desperate, pressuring them into thinking that they have no choice but to pay ridiculous amounts of bitcoins…

Read More

What Penetration Tests Reveal: The Top 3 Findings

Author: Greg Johnson, Vice President of Business Development at A-LIGN. The hacking industry was alive and well in 2015, and it’s funny how the majority of attack vectors haven’t changed in the past five years. I thought it would be interesting to share…

Read More

More Passwords, More Problems: A Look into Biometric Authentication

What’s your password? Studies show that you likely use more than 15 different passwords, but more than half of you admit to using a weak password. So how do companies fare with inconsistent password usage and standardization? Even companies with incredible security practices can become vulnerable due to a forgetful employee who…

Read More

2015 Data Breaches – The Year In Review

Author: Greg Johnson, Vice President of Business Development at A-LIGN. Data breach was alive and well in 2015 with some of the largest breaches in history occurring last year. The Office of Personnel Management (OPM), or in other words our Federal Government, was hacked to the tune of 21.5 million…

Read More

The Connected World: A Look At Mobile Security?

Smartphones are a truly extraordinary technology.  Like an electronic Swiss Armor Knife, they are seemingly magical devices that provide a ton of services in the palms of our hands.  Each day, it seems, a new feature emerges enabling them to do even more.  Using a smartphone a person can video conference, navigate through the perils of rush hour traffic, and download a new recipe for beef stroganoff, just hopefully not at the same time!

Read More

The State of Cybersecurity: How to Prepare For 2015

2014 was a cybersecurity eye opener for all individuals using technology.  The public and many corporations had to personally face the repercussions of the cybersecurity weaknesses throughout all technology.  The whole world was watching this year as cyber-attacks hit one after the other, arguably the worst cybersecurity incident happening in November to Sony Pictures Entertainment.  Not as popular but certainly as devastating, Heartbleed was part of the worst vulnerabilities made public and possibly the worst vulnerability ever released.

Read More

Shellshock: Are You at Risk?

By: Stuart Rorer, Senior Consultant and Penetration Tester at A-LIGN It seems with each passing day more and more vulnerabilities are being released, exposing gaping holes in the security of systems across the globe. Last week a security bulletin was released to the public that exposed a new threat,…

Read More