ProCircular Information Security Experts Corner

External VPN with RDP Access - Should you do it?

Posted by Kaitlin Jones on Jan 22, 2020 10:30:14 AM

You’re sitting on your couch at home, it’s 8:00 on a Saturday night and one of your interns emails you about a new security vulnerability he just heard about on the latest and greatest podcast. You know that this new vulnerability is going to be the first thing to come up during the morning water cooler talk Monday morning. It’s time for you, the great server admin, to take flight and protect your kin!

Read More

Topics: Cybersecurity, Network Security, HIPAA, Information Security, Data Security, cybersecurity plan

Getting Ready for CMMC – Capability Maturity Model Certification

Posted by Brandon Blankenship on Dec 20, 2019 6:45:00 AM

If you’re in the Department of Defense supply chain, you’ve become familiar with DFARS and the corresponding NIST SP 800-171 r1 over the last few years. It is a list of 110 controls that you need to be compliant with in order to continue supplying certain contracts.

Read More

Topics: Cybersecurity, Information Security, DFARS, cybersecurity plan, NIST

How things stand: a cybersecurity recap of 2019

Posted by Aaron R. Warner on Dec 19, 2019 2:00:00 PM
Read More

Topics: Cybersecurity, Network Security, Information Security, Vulnerability Assessment, Penetration Testing, Incident Response, it risk assessment

Adblockers: Should you use them?

Posted by Kevin Wolfe on Nov 7, 2019 10:15:00 AM

Chances are that if you've used the internet in the last 15 years you've been subjected to more ads than there are grains of sand on a beach. There's also a good chance you've gotten sick of them and installed an Adblocker.

Read More

Topics: Cybersecurity, Information Security, consumer security

Tracking Users with Browser Fingerprinting

Posted by Josh Magri on Sep 26, 2019 11:52:00 AM

It’s common knowledge that websites are able to give users free content by serving advertisements and performing analytics in order to generate revenue (full disclosure: if you check this page’s source code, you’ll see Google Analytics and HubSpot). It turns out that between you and the website you’re browsing, there are a few friendly third parties who are very interested in your data. Let’s take a surface level look into how online tracking works, and how you may be uniquely identified with a few JavaScript API calls.

Read More

Topics: Cybersecurity, Information Security, Personal Privacy

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates