PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

When in doubt, try "Password123" - How I guessed your password

Posted by Mike Hedlund on Dec 10, 2021 2:56:13 PM

During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.

Read More

Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring

Cybersecurity is a Team Sport: Peter Drucker on Cyber Attacks

Posted by Aaron R. Warner on Oct 11, 2021 10:48:44 AM

When Peter Drucker produced his seminal work, “What Makes an Effective Executive,” in the Harvard Business Review (Drucker, June, 2004), he may not have been writing with cybersecurity in mind. In fact, in 2004, the cybersecurity world had only begun to appear as the many-headed beast it’s become since then. Nonetheless, this text is an excellent guide for executives about incident response and breach management.

Read More

Topics: Cybersecurity, budgeting, security incident handling

When to Hire a vCISO: 3 Signs You Should Invest in Virtual CISO Consulting Services

Posted by Ty Hollins on Jun 1, 2021 10:58:25 AM

A virtual chief information security officer (vCISO) can bring both strategic and operational leadership on security to companies that can't afford a full-time person in an executive cybersecurity role. In the midst of today’s industry-wide shortage of skilled security workers, vCISO could be the best option for finding and retaining critical security leadership. 

Read More

Topics: Cybersecurity, vCISO

6 Benefits of Conducting a Cybersecurity Risk Assessment

Posted by Ty Hollins on Apr 22, 2021 1:49:00 PM

A cybersecurity risk assessment helps you expose and prioritize issues that could undermine your organization’s security. The risk assessment process starts with a series of interviews during which a cybersecurity consultant will meet with key members of your organization to analyze your policies, procedures, and controls. The consultant will tailor the assessment to your organization’s size, industry regulations, business operations, and other special considerations. You’ll work through scenarios to forecast the consequences of vulnerabilities that are common in businesses like yours. One of the main benefits of a cybersecurity risk assessment is an increased ability to identify and prevent cyber incidents from impacting your organization. 

Read More

Topics: Cybersecurity, Network Security, Risk Assessment

How to Choose the Best SIEM System: 5 Things to Consider

Posted by Jarrod Thompson on Mar 18, 2021 3:19:26 PM

Security information and event management, or “SIEM,” is a tool that assimilates all of your log data to give you an all-encompassing overview of the activity on your network. SIEM tools watch over your network and help you stop trouble in its tracks. Whether your organization has 200 or 20,000 employees, SIEM software can be a vital part of any company’s cybersecurity posture.

Read More

Topics: Cybersecurity, Network Security, SIEM, Monitoring

    ProCircular is a Full-Service Information Security Firm

    We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

    • Breached or hit with ransomware?
    • Don't know where to start? 
    • Looking to confirm your security with a third party?

    Secure your future with ProCircular.

    Recent Posts

    Subscribe to Email Updates