Mar 22, 2016 10:00:00 AM

Inside a Hacker’s Mind

The old adage says, “it takes one to know one,” and we believe that is absolutely true when it comes to fighting cyber threats. Originally, hacker was a positive term for a person who enjoyed exploring the nuances of computers and stretching their capabilities. HORNE Cyber’s team of elite hackers use their expertise of the inner workings of computers, networks and software for the good of our clients, to uncover vulnerabilities and make IT environments more secure.  We spent time this week interviewing our Director of Cyber Operations Wesley McGrew to give you an inside view of a hacker. 

Mar 15, 2016 10:00:00 AM

Securing a Mobile Workforce

Last month, our Executive Partner, Joey Havens, announced a new mobile document sharing platform for our organization. With a mantra of fearless unrivaled flexibility, we allow our employees to be more flexible with their work schedules which usually means more mobile as well. This new tool is also vital for our team members traveling on a daily basis. It will allow for greater productivity for mobile employees and allow us to provide our services more efficiently. 

Topics: securing your data, mobility

Mar 8, 2016 10:00:00 AM

Securely Integrating the Internet of Things

Last week, members of the security industry gathered for the annual RSA Conference to discuss the latest topics in information security, from the Apple vs. FBI encryption debate to the latest innovations in security software. Perhaps one of the hottest topics at RSA this year surrounded the risks posed by devices that make up the ‘Internet of Things.’ From automated manufacturing processes to industrial control systems, all the way down to the appliances in an office breakroom, IoT technologies are changing the way businesses are operating, making systems more efficient, and allowing for greater productivity among organizations. However, with the enormous benefits of IoT come enormous security risks. 

Topics: Internet of Things

Mar 1, 2016 10:00:00 AM

Build Better Legal Cases with Access to Digital Evidence

Attorneys are always looking for new forms of evidence for both criminal and civil matters. With the recent advances in digital forensic capabilities, many legal cases are incorporating digital evidence that, if properly (and legally) uncovered and examined, can be leveraged to help a case. I encourage organizations and attorneys to become more familiar with digital forensics to better understand how it can be leveraged in your future cases.

Topics: digital forensics

Feb 24, 2016 10:30:00 AM

8 Cybersecurity Risks Executives Need to Know

No organization is immune to the threat of security breaches. With cybercrime activity increasing rapidly across the globe, every organization needs to address the potential risks to better protect its systems and sensitive data. It is a complex challenge, however, because organizations must vigilantly monitor and minimize the risks on many fronts and provide protection from cyber criminals, technology innovation, human error, and even natural disasters.

Feb 16, 2016 10:00:00 AM

Vulnerability Scans and Pen Tests: What’s the Difference? Part 3

The Internet of Things Raises Risks Imagine if all of the multi-function printer units in your organization sent an electronic copy of every document that is scanned, copied, or printed to a remote attacker. It happens. Now imagine if someone could tap the microphones in all of your office’s conferencing equipment. It also happens – without your knowledge.

Topics: Vulnerability Scans vs Pen Tests

Feb 9, 2016 10:00:00 AM

Vulnerability Scans and Pen Tests: What’s the Difference? Part 2

As I mentioned in my previous post, there is much confusion in the cybersecurity market around vulnerability scans and penetration tests. The words are not interchangeable. They are very different in the complexity and depth of vulnerabilities that they test, in the talent required to execute them, and in the report that will ultimately be delivered.

Topics: Vulnerability Scans vs Pen Tests

Feb 2, 2016 11:00:00 AM

Vulnerability Scans and Pen Tests: What’s the Difference? Part 1

When safeguarding an organization against the threat of cybercrime, it’s important to regularly test how well your current security measures are performing. I recommend that organizations apply a regular schedule of the right tests to help them identify, prioritize and repair vulnerabilities that may threaten their security.  

Topics: Vulnerability Scans vs Pen Tests

Sep 10, 2015 3:30:00 PM

What to Do When the Worst Happens

I’m sure you’ve heard the saying, “Hope for the best, but expect the worst.” I’d like to offer the IT incident response version, “Hope for the best, but plan for the worst.” Unfortunately, examples of the worst are all around us: patient data stolen from healthcare organizations, customer data stolen from large corporations, social security numbers stolen from the federal government, and even client details stolen from an adultery website. Hackers aren’t just looking for information they can sell; they want embarrassing data, corporate strategy, product research or other sensitive data. Any company using the internet is at risk.

Topics: Strategic IT Advisory, incident response