ProCircular Information Security Experts Corner

Flash Briefing: Presidents' Day Hackers Abound

Posted by Aaron R. Warner on Feb 14, 2019 11:04:20 AM

Presidents' Day is on Monday of next week and this isn’t lost on fraudsters and wire-transfer hackers. Once a wire has mistakenly been sent to the bad guy, each minute counts - the longer the delay the greater the chance they’ve been able to transfer your funds to an account that can’t be reached by the FBI. The added holiday adds an automatic delay that works to their advantage and even the most prepared organizations can fall victim.

Read More

Topics: Cybersecurity, Incident Response, FBI, security incident response

Let your Risk Register be your Guide

Posted by Brandon Blankenship on Jan 30, 2019 12:46:00 PM

“What are the top 7 things you can do to protect your business from hackers?”  Have you ever read a list like that on the internet? In the cybersecurity realm, they’re everywhere. I’ve even assembled and presented one of those lists to a group of business owners myself. They tend to point out things like user awareness training, patching and passwords.  All noble things to get your arms around, of course, but are they useful to a client?  Sometimes I feel as though those lists, as true as they are, are about as useful as telling a football team to “score touchdowns”, or “guard the quarterback.” Yeah, I know that scoring touchdowns is good… but how? 

Read More

Topics: Cybersecurity, HIPAA, DDOS, it risk assessment, cybersecurity plan, NIST

From the Front Lines of Malware Detection

Posted by Bryan Prather-Huff on Jan 24, 2019 3:24:18 PM

Everyone has (or should have) an anti-virus solution. It's probably barked at you once or twice for downloading a file from a sketchy website or opening a link from an email you didn't quite recognize. But how does your anti-virus know what programs are bad, and what programs are good?

Read More

Topics: Cybersecurity, Information Security, Incident Rsponse, security incident handling, security incident response, cybersecurity plan, SIEM

5 Cybersecurity Challenges Unique to Community Colleges – and How to Solve Them

Posted by Aaron R. Warner on Apr 20, 2018 9:27:00 AM

Community colleges face some pretty unique challenges when it comes to cybersecurity.

Read More

Topics: Cybersecurity, Data Breach, Data Security, vulerability assessment, hacking, community colleges

Getting Started with Vulnerability Assessments

Posted by Patrick Quinn on Dec 7, 2017 8:32:00 AM

More than 200 IT and technology leaders from hospitals, schools, and businesses in eastern Iowa came together last month at the Business Technology Conference in Coralville, Iowa – hosted by systems integration firm CEC (Communications Engineering Company) – to learn about new technology and how it can improve processes, profit, and efficiency.

Many types of technology were showcased at the event, but there were plenty of conversations about cybersecurity.

Read More

Topics: Cybersecurity, Data Breach, Vulnerability Assessment, Business Technology Conference

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates