PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

What is an Ethical Hacker?

Posted by Lindy Trout on Oct 1, 2020 10:52:40 AM

What does cybersecurity look like to you? Do you see a cold, robotic engineer performing a quarterly pen test in your conference room? Are you up at night worried about international rings of cybercriminals? Maybe it’s just a term you saw on the compliance checklist. At ProCircular, it’s about the people, and we are highlighting some of the industry’s brightest this Cybersecurity Awareness Month!

Read More

Topics: Cybersecurity, hacking, Company News

#Zoombombing, Nazi's, Kids, and Cybersecurity 2020

Posted by Aaron R. Warner on Apr 23, 2020 12:20:55 PM

Zoom has been a big name in the headlines lately, mainly due to the world’s newfound dependence on, and perhaps obsession with, the platform. As global business is forced to move online, Zoom has become one of the most commonly chosen video conferencing platforms. It’s easy to use, simple to roll out, and the company has provided free and low-cost licenses to both public and private organizations.

Read More

Topics: Cybersecurity, consumer security, hacking

Why Hackers Hack

Posted by Jonathan Peters on Nov 27, 2019 3:30:00 PM

Imagine for a moment your favorite spy movie, maybe a James Bond movie for example. It’s cast of characters likely consists of five or so core archetypical personas. In this cast you likely have a cunning spy, a love interest, the shrouded head of the spy agency, the maniacal bad guy, and a clever hacker sitting in the background. Swooping in seemingly at a moment’s notice to disarm a security system or provide intel about a target’s movements, the hacker always seems to be a mysterious figure with deus ex machina powers. In the following article, we’ll dive into this archetypical figure, breaking down the driving factors behind hacking and the overall ideas behind what makes a hacker ‘tick’.

Read More

Topics: Cybersecurity, hacking

Flashbriefing: Bluekeep Vulnerability

Posted by Scott Taft on Sep 6, 2019 4:10:00 PM

There has been a recent development regarding a potent vulnerability. To help you stay ahead of the situation, please read the following to learn what the exploit is capable of and what can be done to protect against the it.

Read More

Topics: Cybersecurity, Incident Response, hacking, security incident response

The Importance of Password Entropy

Posted by Josh Magri on May 30, 2019 12:12:30 PM

If you’re reading this, it’s very likely that you know how to use the internet. It’s also likely you’ve made an account on the internet somewhere. When you created your last account, what kind of requirements were you forced to use? For a number of web services, these requirements still follow the 2003 NIST SP 800-63 Appendix A standards that recommend an 8-character minimum, containing one uppercase, one lowercase, one digit, and one special character (Ex: Procircular1!).

Read More

Topics: Cybersecurity, Data Protection, Personal Privacy, hacking, NIST, Passwords

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates