Stay up to date on the latest tech trends, IT news, and cybersecurity threats with our educational blog.

Blog

Continuous Penetration Testing

Having been part of the penetration testing industry for over 15 years, I’ve been challenged by many clients with this very question. The fact is that they are right, a penetration test is a point-in-time assessment and new vulnerabilities are discovered every day. We hope that our patch and vulnerability management processes along with our defensive controls keep our systems secure.

Learn More
People are People, but Where Can You Find Them When You Need Them?

Before the current reality of rapidly implementing solutions that support “social distancing” and “self-isolation,” IT organizations were overloaded; do we stand a chance today?  Failure is not an option, and we can all use some help now and then; many organizations need help right now!  SynerComm has a long history of partnering with customers to overcome these challenges.

Learn More
Vendors Stepping Up in a Time of Need

Most enterprises are getting slammed with employees working from home. Most of us designed our remote user VPN’s for the occasional "snow day" ...right. Now we have an entire workforce, working from home full time for weeks…maybe months …oh yeah, and using a full suite of applications including voice… crazy. No really!

Learn More
Remote Access Rush

As the business world reacts to the current health crisis, companies are offering remote access to any role that can work from home. Taking a cue from the changing environment, cyber-criminals are already taking advantage. Here are some recommendations on continuing to practice good information security hygiene as more of the access moves outside of the physical office.

Learn More
Are we prepared?

We all know the stats of the Coronavirus, although they are changing by the minute. We know what to do personally and for our families but what about for our Company? Many customers do have Business Continuity Plans or Enterprise Risk management plans, but do they include plans for a Pandemic such as this?

Learn More
Stop Sharing Your Password with Everyone

Palo Alto Networks firewalls have the ability to create security policies and generate logs based on users and groups, and not just IP addresses. This functionality is called User-ID. User-ID™ enables you to map IP addresses to users on your network using a variety of techniques.

Learn More
Cybersecurity Maturity Model Certification (CMMC)

From a quick assessment on what has been published thus far on the CMMC regulation and its overall goal, it appears that contractors lack of information security will no longer be tolerated by the DoD. Beginning with the introduction of the new regulation to the public in January of 2020, it is expected that new contractual requirements will include CMMC starting in June of 2020, and enforcement for current contractors starting in September of 2020.

Learn More
AWS Metadata Endpoint - How to Not Get Pwned like Capital One

One of the greatest, yet seemingly unknown, dangers that face any cloud-based application is the deadly combination of an SSRF vulnerability and the AWS Metadata endpoint. As this write up from Brian Krebbs explains, the breach at Capital One was caused by an SSRF vulnerability that was able to reach the AWS Metadata endpoint and extract the temporary security credentials associated with the EC2 instance's IAM Role.

Learn More
Understanding HIPAA: PHI and Covered Entities

In a business environment where resources are limited, compliance requirements abound, and budgets are constantly challenged to meet cost containment targets, the complexity of the regulations your business is obligated to comply with can present a challenge. This challenge becomes even more difficult within the dynamic environment of hospitals, doctors’ offices, and all supporting elements of the medical profession.

Learn More
Understanding HIPAA: Starting with the Rules

The Health Insurance Portability and Accountability Act of 1996 establishes requirements for healthcare organizations with respect to ensuring security and privacy of protected healthcare information (PHI) and electronic protected healthcare information (ePHI). Broadly speaking, the overarching HIPAA principle for this type of data is that it is to remain private.

Learn More
1 4 5 6 7 8 10
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram