by Terry Crowley | Oct 16, 2018 | ISMS Consulting
Reading Time: 2 minutes
It looks like Windows 10 has finally overtaken Windows 7 as the most widely-deployed Windows platform. From a cybersecurity standpoint, this is good news. Windows 10 is a more secure environment with more up-to-date security...
by Taylor Smith | Apr 27, 2017 | InfoSec Strategies
Reading Time: 4 minutes
Editor’s Note: This post was originally published in April 2015 and has been updated for accuracy and comprehensiveness. “Web cookies.” We see this term thrown around online quite a bit, whether it be in dialogue boxes...
by John Verry | Nov 23, 2016 | Business Continuity Management, Disaster Recovery
Reading Time: 2 minutes
I recently spoke at the NJ-GMIS Cyber Security Briefing at New Jersey’s Regional Operations and Intelligence Center (ROIC) on approaches to reducing risk in municipal governments via third-party assessment. The presentation ended up...
by Terry Crowley | Nov 22, 2016 | Penetration Testing
Reading Time: 2 minutes
On a recent network penetration test our password catcher software sniffed out a service account logging in and caught its credentials. The hashed password we retrieved was nine characters long. With our homemade password cracking...