PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

What is an Incident Responder?

Posted by Lindy Trout on Oct 8, 2020 9:37:01 AM

The best approach to security is a proactive one, but nobody is perfect. What happens when a determined attacker finds their way into your network? How do you know where they have been, what they have seen, when they got in, and how they gained access? How do you prioritize remediation and confirm that the bad guys are out of your network? Incident responders, like ProCircular's Aaron Heikkila, are at the ready to swoop down and stop the attackers in their tracks!

Read More

Topics: Cybersecurity, Information Security, Data Security, Incident Response, security incident handling, security incident response

Ask an Engineer: What Is SIEM?

Posted by Lindy Trout on Sep 14, 2020 3:47:59 PM

Security Information & Event Management, or SIEM (pronounced "sim," with a silent "e"), is gaining a reputation outside of the cybersecurity community. Advertisements on YouTube and Hulu tout the product’s incomparable security and real-time effectiveness, but they struggle to convey what a SIEM really does. Technical security lingo tends to make non-technical people tune out, and trying to simplify the concept diminishes its value.

Read More

Topics: Cybersecurity, Information Security, Data Security, SIEM

No, Your IT Team Shouldn’t Manage Your Cybersecurity

Posted by Lindy Trout on Feb 26, 2020 11:21:04 AM

If you were going to test the fault-points of a building, you wouldn’t hire the architect, you’d hire a demolitions expert. Similarly, you don’t want the designer of your network testing its security. If the team that configures your network does so incorrectly, they are most likely unaware. The creator of the environment has an inherent bias based on the angle from which they view it. They are blind to vulnerabilities, not necessarily because they are under-qualified, but because they are too close to the project. A security team has a “black box perspective”, which means they have the same outside view of the system that an attacker would. This outsider point of view is just one of the advantages a security expert has over an internal IT team. They also have the training, experience, time, and resources that would be impossible to lump in with a standard IT program.

Read More

Topics: Cybersecurity, Network Security, Information Security, Data Security, Data Ownership, Incident Response, cybersecurity plan

Relieving the Pain of Password Security

Posted by Lindy Trout on Jan 30, 2020 12:55:15 PM

It’s Easier than you Think!

Read More

Topics: Cybersecurity, Information Security, consumer security, Data Security, Passwords

External VPN with RDP Access - Should you do it?

Posted by Kaitlin Jones on Jan 22, 2020 10:30:14 AM

You’re sitting on your couch at home, it’s 8:00 on a Saturday night and one of your interns emails you about a new security vulnerability he just heard about on the latest and greatest podcast. You know that this new vulnerability is going to be the first thing to come up during the morning water cooler talk Monday morning. It’s time for you, the great server admin, to take flight and protect your kin!

Read More

Topics: Cybersecurity, Network Security, HIPAA, Information Security, Data Security, cybersecurity plan

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates