Over years of penetration testing, HALOCK has seen some enduring security vulnerabilities. They are so common, in fact, that we have come to expect to see them in the field. Many information security breaches occur because authentication vulnerabilities permit unauthorized access to applications, systems and data. If you were to follow these tips, our penetration […]
PREPARING FOR YOUR DATA BREACH. Author: Chris Cronin, ISO 27001 AuditorMost InfoSec professionals don’t want to think about becoming the next victim of a major data breach to make the headlines. And yet when faced with another major data breach it is a time when Executive Management and security teams reflect on their own insecurities. The […]
I’m going to refer to another something in a previous blog, the one about Verizon’s 2012 Data Breach Report regarding PCI Compliance. One statistic they mentioned was that 96% of victims subject to PCI DSS had not achieved compliance. What does that say? Probably would have stood a better chance had they been compliant. The PCI Data […]
Why Penetration Testing is Essential. Servers, applications, remote users and other services, once connected to your network, pose a risk to your organization. Hackers and malicious users, both internally and externally, may attempt to exploit security weaknesses to gain access to sensitive information assets.