Network Printer Security Best Practices

Network Printer Security Best Practices

I have experienced a common theme in internal network penetration testing: organizations rarely secure their printers. You may be asking yourself, “so what”? I’ve always been keen on this finding as it’s how I obtained domain administrator access on my first internal...
Sensitive Information Disclosure

Sensitive Information Disclosure

Poking Around Have you ever been poking around a website, clicking links, or visiting different directories? If you have, you might have come across something interesting or even a webpage that didn’t have a link pointing to it. If you did find sensitive...
Top 4 Reasons Security Assessment Quotes are Different 

Top 4 Reasons Security Assessment Quotes are Different 

We frequently hear from our clients about the disparity between pricing quotes from multiple vendors. Unfortunately, this often leaves clients lost as they aren’t sure what is a fair price for a quality engagement. It can be frustrating, but unfortunately, the...
Boost Your Security Program for WFH Employees

Boost Your Security Program for WFH Employees

With communities beginning to open back up, companies are considering the decision to stay remote. And this comes with good reasons. The cost of leasing space might be prohibitive and downsizing to host only necessary business functions could help with expenses....
Why You Should Use Password Filters

Why You Should Use Password Filters

Attackers targeting login portals has become common place, so much that many organizations don’t even bother reviewing logs due to the immense number of password spraying campaigns. Adversaries continue this attack path because it’s proved successful The good news is...