Blog

The Value of Recon

Reconnaissance is the first action in which a threat actor engages with a target and for our purposes can be defined as the use of openly available Internet sources of information to gain insight into an organization’s applications, services, technologies, people, and webpage relationships. In a nutshell, reconnaissance is nothing more than locating and analyzing publicly available sources of information about an individual or organization.

Continue Reading

The Future is Now, PCI DSS 4.0

When customers provide a company with their credit card information, they trust that their data will be processed, stored, and transmitted securely. To ensure that businesses meet that expectation, major credit card companies alongside the PCI Security Standards Council, created the Payment Card Industry Data Security Standard or PCI DSS for short. PCI DSS is a set of technical and operational requirements intended to protect account data, combat fraud, and reduce the chances of data being breached. 

Continue Reading

Enforcing a Cybersecurity Strategy

The changed world we have found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Working from home, the ongoing digitization of our lives, and the increasing online nature of business mean opportunities for phishers, hackers, and scammers have increased. As we head into 2022, there is, unfortunately, no sign of this letting up. Therefore, it is essential for individuals and businesses to be aware of the ever-growing avenues of attack and implementing practices to mitigate the risks.

Continue Reading

Conduct Your OSINT Using Mitaka

Open-Source Intelligence or, OSINT, is the collection and analysis of information gathered from publicly available sources. This extends to much more than a Google search. There is much more information on the internet than can be found using search engines. It is estimated that only 4% of the internet is searchable using search engines. That leaves 96% of information on the internet cannot be accessed using Google, Bing, and other search engines. OSINT tools are effective at finding information which cannot be found by search engines.

Continue Reading

Importance of Audit Log Management

Audit Log Management

Audit logs play a critical role in security management. They can provide us with insight into what has happened on our systems, and on our networks at any given time. More specifically, if implemented correctly, logs can tell us what happened across multiple systems and when a system is compromised, it will log and record all activity of the attacker. These logs can help us prevent or detect violations of confidentiality, integrity, and availability.

Continue Reading

Reduce excuses, strengthen your company’s Cybersecurity posture

Cybersecurity professionals are far too familiar with the classic response “It won’t happen to us.”  This is a common excuse  among business owners that are hesitant to invest in cybersecurity. Unfortunately, many small and medium sized businesses are falling victim to cyber criminals. It is imperative that all organizations regardless of size take the necessary precautions to protect their customers and brand.

Continue Reading

Why you should perform a PCI Compliance Readiness Assessment

A Payment Card Industry Data Security Standard (PCI DSS) readiness assessment can help your organization determine whether you are ready to undergo a full PCI DSS audit or self-assessment. 

Continue Reading

Killware: the future is now 

What is Killware? 

While most malware is deployed to steal privileged information or extort money from victims, Killware poses a much greater threat.  Killware is a blanket term for any number of cyberattacks that are targeted at killing or damaging the real-life health of targets and defined by its result. These attacks could take place on any scale, either against one victim or a larger population. With every aspect of our lives now integrated with the internet, the impact of a successful Killware attack could be devastating. 

Continue Reading

Reliable Cybersecurity Risk Assessments Will Reduce Vulnerabilities

A cybersecurity risk assessment helps an organization expose and prioritize issues that could damage your brand and cripple your operations. The risk assessment process starts with a series of interviews conducted by a Brockton Point Solutions representative and key members of your organization to analyze your policies, procedures, and controls. We will tailor the assessment to your organization’s size, industry, business operations, and other special considerations. You will work through scenarios to forecast the consequences of vulnerabilities that are common in businesses like yours.

Continue Reading

Selecting a Trusted Information Security Partner

Nothing is certain in today’s security landscape and the threats businesses face are evolving daily. Due to the increasing complexity of cyberattacks, many organizations have started to realize the advantage of outsourcing their information security to expert partners.

Continue Reading

Scroll to top