PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

ProCircular Team

Recent Posts

Writing Custom Password Sprayers with Selenium

Posted by ProCircular Team on Apr 8, 2020 12:41:06 PM

Note from the author: While writing this blog post I ran into a client where I needed to spray against the Office365 portal hosted by Microsoft directly and wrote some code to do so. If you just want to read that bit, skip to the end.

Read More

Remote administration for the security minded

Posted by ProCircular Team on Feb 13, 2020 2:44:27 PM

Here’s a quick one for all of the administrators and security practitioners. There’s no shortage of third-party programs designed to do remote desktop management and support. And while sure, many of them are secure, the ones we find in use most often are not. The reason being, they tend to be low or no cost solutions. Now, I’m not one to say that security should always be spendy, but let’s be honest, a lot of the time tools are an investment that management is not always willing to invest in. More often then not when we hit a business that is using VNC as their de facto remote management and support tool, the reason behind it is; “Well, it’s free, and we can shadow and control other machines with it for support calls.”

Read More

Topics: Cybersecurity, Network Security, Information Security

Relieving the Pain of Password Security

Posted by ProCircular Team on Jan 30, 2020 12:55:15 PM

It’s Easier than you Think!

Read More

Topics: Cybersecurity, Information Security, consumer security, Data Security, Passwords

External VPN with RDP Access - Should you do it?

Posted by ProCircular Team on Jan 22, 2020 10:30:14 AM

You’re sitting on your couch at home, it’s 8:00 on a Saturday night and one of your interns emails you about a new security vulnerability he just heard about on the latest and greatest podcast. You know that this new vulnerability is going to be the first thing to come up during the morning water cooler talk Monday morning. It’s time for you, the great server admin, to take flight and protect your kin!

Read More

Topics: Cybersecurity, Network Security, HIPAA, Information Security, Data Security, cybersecurity plan

Why Hackers Hack

Posted by ProCircular Team on Nov 27, 2019 3:30:00 PM

Imagine for a moment your favorite spy movie, maybe a James Bond movie for example. It’s cast of characters likely consists of five or so core archetypical personas. In this cast you likely have a cunning spy, a love interest, the shrouded head of the spy agency, the maniacal bad guy, and a clever hacker sitting in the background. Swooping in seemingly at a moment’s notice to disarm a security system or provide intel about a target’s movements, the hacker always seems to be a mysterious figure with deus ex machina powers. In the following article, we’ll dive into this archetypical figure, breaking down the driving factors behind hacking and the overall ideas behind what makes a hacker ‘tick’.

Read More

Topics: Cybersecurity, hacking

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates