TechGuard Blog


One Employee, One Click...That's all it Takes

Every single employee has a role and responsibility in securing your company. Change the old mindset that security is a task for IT alone. One single vulnerability could have a critical impact on your company's existence. Explore how you can...

LLMNR, NBT-NS, DNS and other acronyms I can own your network with ; )

I do a lot of penetration testing for our clients at TechGuard, and each engagement is different and challenging in its own way. The environments change, the maturity of the security programs vary and the goals of the engagement change based on the...

The ROI of Security Awareness Training

Cybersecurity issues are becoming a daily struggle for companies. In fact, trends indicate a significant increase in hacked and breached data from very common workplace sources such as mobile devices and Internet of Things (IOT). The average...

Addressing Basic Security Practices - One Step at a Time

  Trying to keep up with the latest security topics like Machine Learning, Artificial Intelligence and Anomaly Detection is enough to make your head spin. Knowing where to focus your cybersecurity efforts and where to spend your vital budget dollars...

The OWASP CTF Results Are In!

Have you ever wondered how it would feel to turn evil for a few hours, legally of course? People from all over the St. Louis did just that on Thursday night. STL-OWASP & STL-Cyber hosted a Capture the Flag (CTF) event at the TREX building in downtown...

Security Awareness Training: How to get Buy-In from your Boss

Before you can gain buy-in from management you need to understand what motivates them. Securing their reputation and protecting their bottom line will usually draw their interest. As a middle rank, you have an important job to do. You gather valuable...

Do Outdated Policies Increase Your Cyber Risk?

Did you know? Information security policies and procedures are the backbone of an organization and the foundation of a good security program. If you have information security policies that haven’t been updated in years, you are potentially opening the...

The Threat Within

Secure the perimeter! Man your battle stations! Prepare to repel boarders! Whatever moniker you use to call to attention the threat of outside attackers to your organization, is up to you. The point is it’s dangerous out there, and IT security...

Poisoning the Water Cooler

Have you ever showed up to your workplace and noticed someone new in a faraway corner cube diligently working with implanted earbuds and their eyes fixated forward on their workstation? What goes through your mind? Are they a new intern feverishly...

Top 5 Security Awareness Training Topics

You understand that human behavior plays a huge part in the security posture of your company and that each employee plays an important role in security. So you've decided to go ahead and purchase a Security Training Awareness Solution. However,...

Who’s Ready for a Breach?

The Road Show   Last week Zach Turpen and Nate Rice took the show on the road for a series of workshops with executive teams from various industries.  Our topic: the ever-divisive Cybersecurity Incident Response Plan (CSIRP). Our goal was to inform...

Taking IoT to the House

What is the Internet of Things (IoT)?   The “Internet of Things”, commonly referred to as IoT, brings internet connectivity to everyday devices allowing them to communicate and interact. IoT devices are meant to automate tasks for people at home, in...

1 2 3 4 5
... 9

 


 

Read More Articles →