Blog

Here is where you will find a broad range of practical and actionable topics on Security.
Complacency and its Role in "Insecurity"
22
Complacency and its Role in "Insecurity"

Complacency is a feeling of quiet pleasure or security, often while unaware of some potential danger, defect, or the like; self-satisfaction or smug satisfaction with an existing situation, condition. Complacency to a bad actor is like prey for a predator. It is what most hackers count on when singling out a victim…

Read More
Penetration Testing - The Good The Bad and The Ugly
11
Penetration Testing - The Good The Bad and The Ugly

As most know, the SecuSolutions team are strong advocates of penetration testing and red teaming. It’s a sizable chunk of our business and growing month over month thanks to the referrals and repeat business we are enjoying; however, it’s not always smooth sailing. The Good Depending on which side of the aisle you’re…

Read More
A Vulnerability Assessment is NOT a Penetration Test
04
A Vulnerability Assessment is NOT a Penetration Test

A Vulnerability Assessment is NOT a Penetration test. Don’t be misled, it could be a costly mistake. Before starting my first security company in Japan in 1999, a security administration tool called Satan was released. This appears to be the first assessment tool made available to scan networks and identify possible…

Read More
27
Don’t Drink the Marketing Cool Aid

Marketing is a masterful art. It works on each and everyone of us in different ways. It could be an advertisement on a car you’ve been dreaming of, or it could be a new gadget you think you may need. It might be a motorcycle or a new RV but whatever it is that got you to buy, clever marketing has played a role in it…

Read More
27
Executive Management and the IT Department, The Great Divide

For the past 24 years (and likely the foreseeable future), executive leadership and the IT Department have seen things differently… a lot differently. This stems mainly from the fact that executive management does not completely understand the needs of the IT department, and the IT department feels the same way about…

Read More
27
Introducing your Weakest Security Link

Isn’t it interesting that despite all the statistics that suggest humans are the weakest security link, many organizations turn a blind eye to the importance of providing their staff with information security (InfoSec) awareness security training or the tools to help them defend the corporation they work for? Many of…

Read More
24
Your IT Guy is NOT your Security Guy

For the last nearly 23 years of running a cybersecurity company, one thing has remained consistent and that is that IT staff, sys admins, network admins, love to hate security personnel. I say this because of the countless times we have been hired by companies to provide a security service only to be met with a line of…

Read More
09
The Pandemic – Our Worst Nightmare – A Hackers Dream Come True

There is no doubt that the pandemic has caused great hardships on people, the economy, and a host of other things that we may not feel the impact on for months and or years to come. There is no doubt that the pandemic has caused great hardships on people, the economy, and a host of other things that we may not feel the…

Read More
07
Cybersecurity & the Digital Supply Chain

Did you know that in the post-COVID world, there is an accelerated and necessary adoption of digital technologies throughout the industrial world in the quest of operational advantage and excellence? The Hackett Group reports that adoption of supply chain network design and optimization tools, are expected to grow from…

Read More
02
Cybersecurity Month? – What About the Other Eleven?!

October is here, that time when additional attention is brought to the importance of cybersecurity. For some companies, it’s the time to reaffirm their commitment to the plans they already have in place or the strategies they intend on launching to further the defense against cyber-attack. For other companies…

Read More
27
Password Protection – The Truth Behind the Characters

Have you ever wondered; how strong your passwords really are? Are eight characters enough, or should you use twelve? The answer is neither, is necessarily the “right” answer. This is due to password cracking. Password cracking is a method of attack where cybercriminals attempt to “crack” or steal passwords from their…

Read More
17
Cybersecurity - The Cost of Procrastination

Did you know, your procrastination could cost you more than security would? The price tag for indecision, is very costly, yet many remain complacent when it comes to security. Over the past 21 years, working in the IT security sector, we have heard every excuse in the book about the reasons why security budgets get…

Read More
06
Cybersecurity Services: Responsive or Responsible?

Nobody can deny that the business of cybersecurity has become one of the hottest and in-demand segments in the IT marketplace. It is clear that the criminal element can conduct their activities globally with ease and little chance of apprehension. In a rapidly growing and evolving digital revolution the future is…

Read More