Call Us Today! (866) 435-8364

Cyber

New York State SHIELD (Stop Hacks and Improve Electronic Data Security) ACT

New York State SHIELD (Stop Hacks and Improve Electronic Data Security) will go into Effect March 21, 2020. This gives businesses a little less than nine months to become familiar with it and prepare for it entails. What is the SHIELD Act? The Stop Hacks and Improve Electronic Data Security (SHIELD) Act redefines data security

2020-04-27T10:29:50-04:00July 30th, 2019|Cyber|

Update your web filters and block these sites

Are you blocking websites today? If you are, they are most likely sites such as file sharing, public email, social media, and other non-business related websites.If you do not have a web filtering solution or have avoided blocking websites for the sake of keeping your employees happy, you should reconsider. Many of these sites, especially

2020-04-27T10:29:52-04:00July 16th, 2019|Cyber|

Cybersecurity Alert – OCIE – Safeguarding Customer Records and Information in Network Storage – Use of Third Party Security Features

Alert On May 23, 2019, the Office of Compliance Inspections and Examinations ("OCIE") issued the alert "Safeguarding Customer Records and Information in Network Storage - Use of Third Party Security Features". In this alert the OCIE 'identified security risks associated with the storage of electronic customer records and information by broker-dealers and investment advisers in

2020-04-27T10:29:52-04:00May 27th, 2019|Cyber, OCIE|

Beyond the Grave virus, is it a hoax or a warning sign?

Here’s why we think there is something interesting about the “Beyond the Grave Virus” supposedly affecting hedge funds. We were curious because there was some chatter about it being a hoax. While this can be (very) true, we think it was worth looking in to. Who knows, it may possibly be an early exploration expedition

2020-04-27T10:29:58-04:00March 1st, 2019|Cyber|

There is a difference between privacy and cyber(security).

We see too often that the terms privacy and security (cybersecurity) are used interchangeably and felt it was important to help people understand that they are not the same thing. Yes, there is a relationship between the two, but again, they are not the same thing. If you ask a group of cybsecurity professionals whether

2020-04-27T10:35:16-04:00February 28th, 2019|Cyber|

Automating Password Cracking Using Responder and Hashcat! (Part 1)

Responder, one of the tools that is part of every pen-testers toolkit (if you are a pen-tester and you don't use it, shame on you), is by far one of the greatest tools ever made. We use it on every internal and sometimes external pen test that we do. For those that aren't familiar, responder

2020-04-27T10:35:18-04:00February 7th, 2019|Cyber|

“New” phishing campaigns – leveraging scare tactics (Ransomware 3.0)

We got an email today that we thought was very interesting. Most of the email phishing campaigns that we've seen thus far, and the most common ones our clients typically get fall into two buckets: click a link or open an attachment. We all know how effective some of these campaigns are. Lots of people

2020-04-27T10:35:19-04:00February 6th, 2019|Cyber, Phishing|

How we were able to bypass Windows Defender on a Windows 10 machine to get a reverse shell!

It seems we just peaked your interest, right? Isn’t that the reason you are here reading this? It’s either that, or you are just trolling, you know who you are. We’ve experienced first-hand and have also heard from many of our fellow pen testers that anti-virus solutions, especially some of the next-gen solutions are easy

2020-04-27T10:35:20-04:00January 23rd, 2019|Cyber, Penetration Test, Red Team, Reverse Shell, Unicorn|

Is your email address the new social security number, and what does that mean?

Remember that time when you registered your first email address? For many of you it was probably with America Online (AOL), Echomail, Yahoo, Hotmail, etc. How many of you are still using those accounts today? I venture to say probably a good number of you. I openly admit that I still use an account that

2020-04-27T10:35:22-04:00November 18th, 2018|Cyber|

Are you fully protected if relying on credit and identity theft monitoring?

Are you a high net or ultra-high net worth individual? Do you think credit and identity theft monitoring is worth it? Are you currently enrolled in one of these programs? I have personally been enrolled in these programs since 2009. Does it solely give me comfort knowing that my credit and identity is protected? No,

2020-04-27T10:35:25-04:00August 21st, 2018|Cyber, Identity Theft|
Go to Top