Blog

Blog

Everything You Need to Know About Web Security

Last updated on April 24, 2020.Web security, your site and your networkWeb sites are unfortunately prone to security risks. And so are any networks in which web servers are connected. Setting aside risks created by employee use or misuse of network resources, your web server and the site it hosts present your most serious sources of security risk.Web servers by design open a window between your...
Blog

What Not to Do for IBM i Disaster Recovery

It may seem like common sense, but you’d be surprised how many organizations are still making these tape media mistakes. If this is you, there’s never been a better time to change your processes and improve IBM i disaster recovery!
Blog

Defuzzing API Testing: The Search for Vulnerabilities

REST APIs have allowed us to create modern web and mobile applications; By using the power of an API, we can open up the world of services – pulling in data and sharing information and oiling the wheels of the internet.But building an API-enabled service also means that you potentially open up your web or mobile application to cybercriminals.In the first nine months of 2019, 7.9 billion data...
Blog

Information Security Goes Non-Binary

This article was originally published on HelpNetSecurity on April 16, 2020.Finding security holes in information systems is as old as the first commercially available computer. Back when a “computer” was something that sat in a computer room, users would try to bypass restrictions, sometimes simply by trying to guess the administrator’s password.Later when Bulletin Board Systems (the primitive...
Blog

Is Automation the Future of Pen Testing?

This article was originally published on Enterprise Management 360 on March 31, 2020.Penetration testing is the Marmite of cybersecurity: you either love it or you hate it. Taking a neutral stance on the matter, it’s easy to see both sides. On one hand, pen testing provides indisputable evidence of vulnerabilities for organisations to action. Pen testers are also often able to identify even the...
Blog

Common Excuses for Not Automating

Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog

How to Manage Employees Devices Properly: Employee Device Management

Across the world, companies like Google, Microsoft, Amazon, Twitter, and yes, Fortra, have asked their employees to work from home in response to the Coronavirus (Covid-19) pandemic. As employees move from on-premises offices to their homes, businesses will be faced with the challenge of managing and securing both company-owned and employee-owned devices as they access company resources from...
Blog

PCI Vulnerability Scanning

Accepting credit card payments is an everyday task all small business owners and merchants must perform when conducting transactions. However, if you handle consumers’ credit card information, there are inherent data security risks to manage and mitigate.Security holes in your payment processing system can result in stolen client information or identity theft, and you’ll have to pay your bank a...
Blog

MSPs and the Fight Against Ransomware

It seems many cybercriminals have begun to set their sights on Managed Service Providers (MSPs). In fact, 80% of MSPs say their organization has been targeted by ransomware.Not unlike the rest of us, cyber attackers want to work smarter, not harder. If they are able to successfully infiltrate one MSP’s network, they can potentially gain access to all of their clients’ systems as well. The more...