by Peter Alexander | Jan 10, 2017 | InfoSec Risk Assessment
Reading Time: 3 minutes
As the Internet of Things continues to grow, how can businesses protect themselves against IoT vulnerabilities? Recent hacks prove the need to prepare, and businesses need to plan ahead for IoT-related attacks that might come out of...
by Peter Alexander | Oct 11, 2016 | ISMS Consulting
Reading Time: 2 minutes
Especially if your information security controls are robust, a seemingly insignificant vulnerability could be the one that leads to a breach. It all depends on your specific situation and the actual risk presented. As an analogy,...
by Peter Alexander | Aug 11, 2016 | ISMS Consulting
Reading Time: 2 minutes
It’s commonplace for the vulnerability scans I run at client sites to turn up servers running unsupported software like Windows Server 2003, SQL Server 2005 or Cisco’s IOS 15. Our scans flag this as a critical issue. Often the client...