TechGuard Blog


Grant Codak

Grant Codak
Grant has over a decade of IT experience spanning a variety of domains with a focus on defensive security. Grant is currently a Cybersecurity Expert at TechGuard Security where he performs a wide variety of proactive security services, including penetration testing. He also holds the following certifications: CISSP, CEH, Security+, Network+, A+, and Metasploit Pro Certified Specialist. Recent responsibilities include, a Senior Web Security Engineer at a Fortune 50 organization along with a variety of application administration roles in security operations. His past project work includes, web tool development as well as firewall and web proxy migrations. Currently at TechGuard Security, Grant conducts audit control assessments, penetration tests, vulnerability assessments and social engineering exercises. Grant ties his knowledge together with his deep understanding of network operations and security architecture to deliver approachable report analysis to clients. Grant is also a nature enthusiast and enjoys mountain biking, hiking and kayaking.
Find me on:

Recent Posts

How to Talk to Your IT Admin About Compliance

Have you ever tried bringing up compliance with an IT Admin? It usually ends up in one of two ways. The first is that the administrator’s eyes will glaze over as they begrudgingly accept their fate to add yet another responsibility onto their already...

Business Security in a COVID World. Now What?

On May 1st, President Trump signed a state of the emergency order that declares foreign cybersecurity threats to the electrical system a national emergency. Shortly afterward on May 15th, a cyber attack was reported in the U.K. National Market....

Building Your Primary Defense Strategy Through a Security Awareness Program

How should I start? The question going through most business leaders and policymaker's minds, is often, “Where do I start?” Creating a solid plan and making it as extensible to your future growth as possible is usually the best approach. The first thing...

COVID-19: Teleconferencing Concerns

There have been a lot of questions around teleconference security during this pandemic. When people are forced to use a service more, the lack of understanding and security around the product breeds fear when they start to hear about the risks that are...

The Quantum Problem

Quantum cryptography or quantum encryption takes advantage of quantum mechanics to encrypt and secure message delivery. It acts similarly to modern-day encryption ciphers like AES or RSA However, when using a quantum computer for cryptography, it can...

Chaining Pathogens

Working from home? Are you finally catching up on all those updates and patches that you’ve neglected to take the time to install over the past couple of months? Well,Microsoft has also put a pause on all non-essential patches during the coronavirus...

TechGuard Attends RSA 2020

The focus of the RSA 2020 was the “Human Element.” This was certainly on display in a variety of different aspects. Attendance and foot traffic was noticeably down compared to events spanning prior years. Big names such as Verizon, IBM, and AT&T were...

Cyber Experts Have Found Themselves Using a New Four-Letter Word

Have your systems been tagged with a death note of ransomware? Ryuk has been making its rounds this December and causing holiday misery for organizations left and right this year. Typically, attacks increase near the holiday season and end of the year...

Camera App Vulnerability Allows Hackers a Look at Your Private Information

What is the most un-nerving action hackers can do to your smartphone? Perhaps, hack into your camera and watch you as you go about your day? What about jack into your microphone and listen to everything you say in your daily meetings? Well, a series of...

Are You Ready for CMMC?

Do you do work with the Department of Defense (DoD)? If so, are you preparing for the “CMMC?” If not, you might want to head on over hereand take a look at the draft cybersecurity document that’s on the cusp of being implemented.

How You Can Better Manage Vulnerabilities

Vulnerability Management. How often do you scan your network for vulnerabilities? What does your process for remediating these vulnerabilities look like? If you’re like most companies, you might scan once a year with your yearly compliance penetration...

Compliance: You Actually Need It

One of the first steps to start your security program is finding out where you are the most vulnerable. Usually, the best way to do this is using a process or a tool that can track the risks associated with each individual asset that your business owns....

1 2

 


 

Read More Articles →