Sage Advice - Cybersecurity Blog

10 Tips to Reduce Common Vulnerabilities Exploited by Cybercriminals

While it seems that today’s cybercriminals have a myriad of tricks and techniques at the ready to gain access to your network, the reality is that they are typically taking advantage of common vulnerabilities – such as unpatched software or default passwords – time and time again. That’s why establishing a regular process for finding those vulnerabilities that put you at risk is a critical part of your cybersecurity program.

Read More

Topics: Technical Testing, Cybersecurity Assessment

What’s the Difference between a Penetration Test and a Vulnerability Assessment?

In the world of cybersecurity, nothing is static. The cyber threat environment is dynamic and evolving. There are new vulnerabilities discovered on a daily basis. Attacks are getting more sophisticated – they’re getting more complex and flying under the radar of traditional detection technologies.

Read More

Topics: Cybersecurity Assessment, Technical Testing

Types of Penetration Tests and Why They are Important

While everyone may be tired of hearing, it’s not if you’ll be breached, but when, it’s the reality of our current environment. Breaches are exploding in scale and scope, and with the availability of malware-as-a-service, it’s no longer just individual lone hackers trying to get in. It’s a thriving business. One that’s incredibly organized and highly profitable.

As such, part of your cybersecurity defense strategy should include assessing the strength of your defenses against hackers. How? Using penetration testing, where a trained “white-hat” hacker tries to exploit your network much like the bad guys do.

Read More

Topics: Technical Testing, Cybersecurity Assessment

Red Team Reality Check

At the very least, a high-profile, bull’s-eye breach teaches the victimized organization some hard lessons. Though it’s not an easy exercise for most SOC teams, C-suites, and boards, it’s far better to learn these tough security lessons upfront, by thoroughly testing their people, processes, and technologies.

Read More

Topics: CyberCrime Symposium, Cyber Crime, Technical Testing

It's More than a Vulnerability Scan: Penetration Testing Explained

When I ask information security professionals what keeps them up at night, many times they say, “What I don’t know.” It’s no surprise – with reports of breaches on an almost daily basis, it’s impossible to ignore that there are a lot of hackers out there trying to get into networks wherever they can, with tools and techniques that are constantly evolving.  As such it’s important to be diligent about assessing your overall security from the perspective of a hacker.  And the best way to do this is through a penetration test. 

Read More

Topics: Cybersecurity Assessment, Technical Testing