by Terry Crowley | Apr 27, 2021 | InfoSec Strategies
Reading Time: 3 minutes
Your VPN (Virtual Private Network) is intended to protect your online privacy and make life harder for hackers by anonymizing your traffic and location. So think about how devastating might it be for your business if a hacker was...
by Terry Crowley | Dec 16, 2019 | Social Engineering
Reading Time: 2 minutes
So the other day I managed to sneak into a bank’s ATM service room. I was left alone in there, looking wide-eyed at the back of the ATM machine. I could’ve downloaded some malware, installed surveillance cameras to capture...
by Terry Crowley | Nov 13, 2019 | Penetration Testing
Reading Time: 2 minutes
One of the challenges of my job is about once every five weeks or so our marketing director shakes me down for a blog topic. If I don’t have one in mind he tries to brainstorm with me. “What’s going on in your practice that’s new or...
by Terry Crowley | Oct 22, 2019 | Penetration Testing
Reading Time: 2 minutes
As homo-sapiens we are naturally competitive creatures. Although evolutionally this has helped our species in numerous ways, there are a few times where it bites us right in our highly evolved butts… When we perform network...
by Terry Crowley | Jul 3, 2019 | Penetration Testing
Reading Time: 3 minutes
Just because you moved your virtual servers, databases and/or applications to the public cloud doesn’t mean they are somehow now magically secure. You still need penetration testing to verify your cloud environment is secure and to...