Stay up to date on the latest tech trends, IT news, and cybersecurity threats with our educational blog.

Blog

I have M365 for our Enterprise email... OMG how to deal with the outages?

Another M365 email outage... seriously just Google it... there are even multiple websites that monitor and tell you there is an outage but there is nothing you can do about it… or is there? Whether it is email, Azure, Teams or? What can you do? Better question yet… now, what are your employees doing while they wait?

Learn More
Time to Upgrade from Outdated Managed Vulnerability Scanning to Continuous Attack Surface Management

Whether you are vulnerability scanning to meet compliance requirements or doing it as part of good security practices, there is a universal need. At the time of this article, there are essentially three equally capable and qualified scanning solutions. They include products from Tenable, Rapid7 and Qualys. My point is that each of these scanning solutions, if configured correctly, should produce accurate and similar results.

Learn More
In Scope or Out of Scope?

In penetration testing, it’s important to have an accurate scope and even more important to stick to it. This can be simple when the scope is limited to a company’s internet service provider (ISP) or ARIN provided IP ranges. But in many cases, our client’s public systems have grown to include multiple cloud hosted servers, applications, and services.

Learn More
Empowering Your Project Manager: The Benefits of an IT Focused Approach to Logistics

One of the things I have noticed while working at SynerComm is that while most companies have employees on staff who possess the necessary technical knowledge to complete their projects, many organizations lack the logistics knowledge that large‐scale deployments require.

Learn More
The Benefits of a Partnership Built on Trust

Our team begins every project by listening to our customers carefully and hearing their asks. This listen‐first approach allows us to work with purpose, seeking and confirming our understanding of our customer's challenges by bringing questions and ideas to the table. Our customer interactions are guided by and benefit from the depth and breadth of our knowledge in both the IT infrastructure and logistics spheres.

Learn More
Penetration Testing Myths, Truths, & Best Practices

SynerComm partnered with ChannelBytes to present 60 minute session where we discuss what it means to do quality, modern penetration testing in 2020.

Learn More
SynerComm Reboots a Security Staple with 'Continuous' Pentesting

SynerComm discusses Continuous Penetration testing with Dark Reading as a part of the Black Hat USA 2020 virtual conference.

Learn More
Incorporating Your Lessons Learned for Pandemic Contingency Planning Considerations

Due to the ubiquity of technology within any business, contingency planning is a company-wide effort. Not only the planning, but the execution of the plan at any level will require the cooperation of business managers and technology managers.

Learn More
We’ll get through this; how will it make us stronger? Make COVID-19 “lessons learned” a priority

The approach of a “lessons learned” exercise is a method of continuous improvement that is based on a singular event (COVID-19) or similarly related events.

Learn More
Building a Pwnagotchi

Pwnagotchi is an A2C-based “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures. This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs.

Learn More
1 3 4 5 6 7 10
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram