ProCircular Information Security Experts Corner

Flashbriefing: Bluekeep Vulnerability

Posted by Scott Taft on Sep 6, 2019 4:10:00 PM

There has been a recent development regarding a potent vulnerability. To help you stay ahead of the situation, please read the following to learn what the exploit is capable of and what can be done to protect against the it.

Read More

Topics: Cybersecurity, Incident Response, hacking, security incident response

The Importance of Password Entropy

Posted by Josh Magri on May 30, 2019 12:12:30 PM

If you’re reading this, it’s very likely that you know how to use the internet. It’s also likely you’ve made an account on the internet somewhere. When you created your last account, what kind of requirements were you forced to use? For a number of web services, these requirements still follow the 2003 NIST SP 800-63 Appendix A standards that recommend an 8-character minimum, containing one uppercase, one lowercase, one digit, and one special character (Ex: Procircular1!).

Read More

Topics: Cybersecurity, Data Protection, Personal Privacy, hacking, NIST, Passwords

LLMNR & NBT-NS Spoofing

Posted by Dawson Medin on Apr 30, 2019 2:09:00 PM

During a penetration test, we’ve found that a common (and easy) way to gather credentials and gain an initial foothold on the client’s network is to perform a Man-in-the-Middle poisoning attack abusing LLMNR & NBT-NS. Depending on how active users are on the network, this attack can give an adversary valuable information almost immediately. Fortunately, with a little knowledge, this attack can be easily remediated.

What is LLMNR & NBT-NS? 

Read More

Topics: Cybersecurity, Network Security, Information Security, hacking

5 Cybersecurity Challenges Unique to Community Colleges – and How to Solve Them

Posted by Aaron R. Warner on Apr 20, 2018 9:27:00 AM

Community colleges face some pretty unique challenges when it comes to cybersecurity.

Read More

Topics: Cybersecurity, Data Breach, Data Security, vulerability assessment, hacking, community colleges

Involving the FBI After a Cybersecurity Incident

Posted by Patrick Quinn on Feb 20, 2018 9:38:41 AM

U.S. Federal Bureau of Investigation (FBI) Special Agent Jeffrey Huber, who runs point on cybersecurity for the state of Iowa, was on hand at a recent ProCircular roundtable to talk about the FBI’s Cyber Division and its role in addressing cybercrime.

Read More

Topics: Data Breach, Incident Response, hacking, FBI

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates