Get Our Weekly Blog Sent Straight to Your Inbox
Could a Phishing Email Get your Employees Fired?
Although most of us have heard plenty of times to watch out for business email compromise (BEC), often employees still feel tempted to click on the bait before they really think through the consequences. Even worse, as soon as they realize they should...
Practice What you Breach - Incident Response Plan Basics
Plan to fail instead of failing to plan According to a November 2018 Gallup poll, 71% say they frequently or occasionally fear that computer hackers will access their personal, credit card or financial information. The best way to control fear, is to...
How Your Extensive Security Measures Could Fail You
If you still think your current efforts are enough, learn a lesson fromWipro. This IT outsourcing giant's internal IT systems have been hacked. As a result, the adversaries used Wipro’s systems to launch attacks against the firm’s own customers....
Open-Source Software: The Hidden Cost of Freedom
Does your organization use open-source software components in any of its internal or external facing web applications? Are you actively tracking those packages for updates and patches? Have you ever evaluated the security posture of your web...
HIPAA/HITECH Compliance Infographic
Can you confidently say that your company is HIPAA/HITECH compliant? Even your well-intentioned employees can leave your company at risk to get hit by large fines or more importantly, a damaged reputation.
Commercial Services Infographic
Today's technological world demands that all businesses make cybersecurity a priority. Learn how to protect the sensitive and private information of your clients. Check out our infographic on our commercial services.
Don't let these 10 Cybersecurity Myths Fool You
Nearly every day we learn of another business hit with a cyberattack whether it is a point-of-sale system or a general data breach. No matter the type of attacks that continue to surface, many employees are stuck in the old mindsets of why attacks happen...
Could BlueKeep become the next WannaCry? Patch NOW!
Microsoft announced in early May on Patch Tuesday that a critical flaw was identified and required immediate patching. This flaw quickly became known as BlueKeep, a critical remote code execution (RCE) vulnerability in Windows operating systems,...
How Strategic Partnerships Benefit You
Increased revenue is an obvious benefit to any strategic partnership. However, beyond revenue, there are several perks a good partnership can bring to your business. To have a successful partnership agreement it must be a win-win for both parties. The...
How to Become a Pentester
How did you get you your job? What do I have to do to do what you do? Since becoming a Cybersecurity Expert at TechGuard Security, I have received these questions on several occasions particularly regarding Penetration Testing or pentesting. It’s...
LLMNR, NBT-NS, DNS and other acronyms I can own your network with ; )
I do a lot of penetration testing for our clients at TechGuard, and each engagement is different and challenging in its own way. The environments change, the maturity of the security programs vary and the goals of the engagement change based on the...
The ROI of Security Awareness Training
Cybersecurity issues are becoming a daily struggle for companies. In fact, trends indicate a significant increase in hacked and breached data from very common workplace sources such as mobile devices and Internet of Things (IOT). The average expenditures...