ProCircular Information Security Experts Corner

External VPN with RDP Access - Should you do it?

Posted by Kaitlin Jones on Jan 22, 2020 10:30:14 AM

You’re sitting on your couch at home, it’s 8:00 on a Saturday night and one of your interns emails you about a new security vulnerability he just heard about on the latest and greatest podcast. You know that this new vulnerability is going to be the first thing to come up during the morning water cooler talk Monday morning. It’s time for you, the great server admin, to take flight and protect your kin!

Read More

Topics: Cybersecurity, Network Security, HIPAA, Information Security, Data Security, cybersecurity plan

Getting Ready for CMMC – Capability Maturity Model Certification

Posted by Brandon Blankenship on Dec 20, 2019 6:45:00 AM

If you’re in the Department of Defense supply chain, you’ve become familiar with DFARS and the corresponding NIST SP 800-171 r1 over the last few years. It is a list of 110 controls that you need to be compliant with in order to continue supplying certain contracts.

Read More

Topics: Cybersecurity, Information Security, DFARS, cybersecurity plan, NIST

How things stand: a cybersecurity recap of 2019

Posted by Aaron R. Warner on Dec 19, 2019 2:00:00 PM
Read More

Topics: Cybersecurity, Network Security, Information Security, Vulnerability Assessment, Penetration Testing, Incident Response, it risk assessment

Why Hackers Hack

Posted by Jonathan Peters on Nov 27, 2019 3:30:00 PM

Imagine for a moment your favorite spy movie, maybe a James Bond movie for example. It’s cast of characters likely consists of five or so core archetypical personas. In this cast you likely have a cunning spy, a love interest, the shrouded head of the spy agency, the maniacal bad guy, and a clever hacker sitting in the background. Swooping in seemingly at a moment’s notice to disarm a security system or provide intel about a target’s movements, the hacker always seems to be a mysterious figure with deus ex machina powers. In the following article, we’ll dive into this archetypical figure, breaking down the driving factors behind hacking and the overall ideas behind what makes a hacker ‘tick’.

Read More

Topics: Cybersecurity, hacking

ProCircular CEO, Aaron Warner supports the cyber community

Posted by Aaron R. Warner on Nov 18, 2019 1:15:00 PM

ProCircular founder and Chief Executive Officer, Aaron Warner is slated to speak at the first annual Awareness Con, an information security conference hosted by Black Hills Information Security (BHIS). The event will be hosted on Wednesday, November 20th in Adel, Iowa at the Adel Public Library. The purpose of Awareness Con is to draw attention to the profession of ethical hacking, commonly referred to as Penetration Testing, and the benefits this practice can have for organizations of all types. Penetration Testing is a simulated attack on an organization's computer and physical security systems to ensure that existing security measures in place are effective.

Read More

Topics: Cybersecurity, Penetration Testing, Company News

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates