How to Handle Security Misconfigurations
No matter how big or small your company is, security misconfigurations will always be a topic of discussion. Security misconfigurations,...
Explaining Web Application Attacks
Healthcare web applications provide access for patients to make appointments and obtain copies of test results and medical records, but...
What is Patch Management?
Patch management is the practice of keeping software up to date through software updates. The updates, called patches, are necessary...
Let’s Get Back to the Basics
Nowadays, there is an abundance of services revolving around cybersecurity. There are gaps and problems and tools are built to...
What are the motivations for cyber-attacks?
Cyber-attacks can leave companies wondering “how could this happen to us?” so, when these situations arise, it can help to...
Vulnerability Assessment vs Penetration Testing
Cybersecurity isn’t a one-time, set-it-and-forget-it process. Instead, organizations that want to proactively eliminate cyber threats need diligent assessment and testing...
The Evolving Cyber Insurance Market
The cost of cyber insurance is on the rise with premiums jumping 50-100% in some cases. While inflation is all...
The Motivation of Cyber Threat Actors: Who’s after your stuff?
One way to approach the daunting task of how to protect cyber assets is to look at it from the...
Top-Off Ceremony at Stratix Systems
Monday, May 9, was a day of celebration here at Stratix Systems. That day, Stratix Systems and general contractor D&B...
Social Media Phishing
Social media has blossomed throughout the world over the last decade. What was once a small community has now become...
Seven Tenets of Zero Trust Architecture
In 2020, NIST released special publication 800-207 called Zero Trust Architecture or ZTA. It mentioned specifically seven tenets stating, “A...
Best Practices for Web Application Testing
Data breaches or disclosure of information records have become a regular part of business news. According to the Identity Theft...