PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

Nmap Techniques for Security and Administration

Posted by ProCircular Team on Oct 10, 2019 8:30:00 AM

One of the most popular tools in infosec would have to be Nmap. Nmap is a Swiss Army knife of a tool when it comes to networking and is used by many more than just the infosec crowd. Network and Systems Administrators have come to rely on this tool to gather information about their environments.

Read More

Topics: Cybersecurity, Data Security

Employee Buy-in: Reaching the Unreachable

Posted by ProCircular Team on Sep 9, 2019 11:02:00 AM

In security, it’s often said that you will have little success within an organization if you do not have buy-in from management. However, there’s a larger group that is often-overlooked though critical to a successful security program. And they impact all aspects of your security posture. That group, of course, is the end users.

Read More

Topics: Cybersecurity, Data Security, Security Awareness Training

Incident Response Planning 101

Posted by Brandon Blankenship on Jun 27, 2019 4:42:15 PM

Cybersecurity breaches are becoming more and more prevalent. In fact, it’s been estimated that there were almost 5 billion records breached in 2018. Many organizations spend thousands of dollars on security breach prevention tools, but won’t take the time to create a formal process of identifying, responding to, and communicating an incident.

Read More

Topics: Cybersecurity, Data Breach, Data Security, Incident Response, security incident handling, security incident response

Network Segmentation and Why It Matters

Posted by ProCircular Team on May 20, 2019 11:37:00 AM

Let’s take a look at an often under-utilized aspect of network topology in the small to medium business realm: that’s right, a networking article. But before you run off, what if I told you you could increase performance and lower your production down time with equipment you (might) already have!?

Read More

Topics: Cybersecurity, Network Security, consumer security, Data Security, Data Protection, security incident handling, cybersecurity plan

Cybersecurity: Real vs. Checking the Box

Posted by Brandon Blankenship on Feb 28, 2019 3:38:00 PM

The reason we wear our seat belts is not to avoid getting a ticket from the police, but rather to avoid a potential injury in a car accident. This analogy is an easy way to describe the difference between box-checking security and real security, and it's instantly understood regardless of technical knowledge. This message resonates with executives, because they typically prefer to “get to the point” and correctly protecting their data is “the point” of cybersecurity.

Read More

Topics: HIPAA, Information Security, consumer security, Data Security, Data Protection, Vulnerability Assessment, it risk assessment, DFARS, cybersecurity plan, NIST

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates