Data Classification – What are your crown jewels?

Information Security involves more than hardening your perimeter defenses. The core of your organization is your data – your crown jewels. In order to truly understand the heart of what you are protecting, your data can be “classified.” Peters & Associates can assist you through the process by performing a data classification workshop. During the workshop, [...]

By |2019-05-13T14:05:52-05:00May 2nd, 2019|Security Solutions|0 Comments

This Month in Cyber Security : March 2019 (2:10)

  New cyber security threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team hosts a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. Xfinity Mobile implemented a flawed security protocol, [...]

By |2019-05-03T12:22:50-05:00March 27th, 2019|Security Solutions|0 Comments

Meraki Cameras in the Enterprise

Business owners are increasingly feeling the need to have a record of what transpires on their premises for safety reasons and for legal protection.  Security cameras can help provide an accurate and indisputable record of activity and can also act as a deterrent for theft or other losses simply by their presence.  There are several [...]

By |2019-02-27T12:02:44-05:00February 28th, 2019|Security Solutions|0 Comments

This Month in Cyber Security: February 2019 (2:38)

  New cyber security threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team hosts a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. Common household items like Google home security [...]

By |2019-05-03T12:00:05-05:00February 26th, 2019|Security Solutions|0 Comments

Vulnerability Scanning vs. Penetration Testing

Do you understand the difference? Simply put, vulnerability scanning is passive and penetration testing is active.  Both of these assessments/tests have value and both can assist in your overall ability to evaluate your external security exposure. So, why do either (or both)? Well, for starters because the hackers are doing both too. But also, this [...]

By |2019-02-28T14:32:18-05:00February 5th, 2019|Security Solutions|Comments Off on Vulnerability Scanning vs. Penetration Testing