Blog Posts

cybersecurity, sat, security awareness training Christian Grupp cybersecurity, sat, security awareness training Christian Grupp

What is Security Awareness Training (SAT)?

Security awareness training (SAT) is a critical component of an organization's cybersecurity strategy. It involves educating employees about the importance of cybersecurity and how to protect against cyber threats. The goal of SAT is to create a culture of security within an organization, where all employees understand the risks and take steps to protect against them. In this blog post, we will discuss the key elements of SAT and how to implement it, written for a non-technical user to understand.

Read More
security awareness plan, sap, cybersecurity Christian Grupp security awareness plan, sap, cybersecurity Christian Grupp

What is a Security Awareness Plan (SAP)?

A security awareness plan (SAP) is a comprehensive strategy that aims to educate employees and other stakeholders about the importance of cybersecurity and how to protect against cyber threats. The goal of a SAP is to create a culture of security within an organization, where all employees understand the risks and take steps to protect against them. In this blog post, we will discuss the key elements of a SAP and how to implement one, written for a non-technical user to understand.

Read More

What is the difference between credentialed and uncredentialed vulnerability assessments?

Vulnerability assessments are a critical component of an organization's cybersecurity strategy, as they help identify and prioritize vulnerabilities that could be exploited by attackers. There are two main types of vulnerability assessments: credentialed and uncredentialed. In this blog post, we will discuss the key differences between these types of assessments and the pros and cons of each approach, written for a non-technical user to understand.

Read More
pentest, cybersecurity, whitebox, graybox, blackbox Christian Grupp pentest, cybersecurity, whitebox, graybox, blackbox Christian Grupp

What is the difference between white, gray, and blackbox testing?

In the world of cybersecurity, testing is an essential aspect of identifying and mitigating vulnerabilities in computer systems, networks, and web applications. One of the most commonly used methods for testing is penetration testing, or "pen-testing" for short. Pen-testing involves simulating a cyber attack to identify vulnerabilities that could be exploited by an attacker. There are three main types of pen-testing: white box, gray box, and black box testing. In this blog post, we will discuss the key differences between these types of testing and the pros and cons of each approach, written for a non-technical user to understand.

Read More
cybersecurity, breach, hack, incident, incident response Christian Grupp cybersecurity, breach, hack, incident, incident response Christian Grupp

I was hacked - now what?

A cyber attack can be a devastating event for any business, leading to loss of sensitive information, financial losses, and damage to the company's reputation. In this blog post, we will discuss the importance of having a plan in place to respond to a cyber attack and the key steps you should take, including hiring a firm to help you every step of the way and having a firm on retainer in case you get hacked.

Read More
insurance, cybersecurity Christian Grupp insurance, cybersecurity Christian Grupp

What is CyberSecurity insurance? Do I need it?

Cybersecurity insurance is a type of insurance that provides financial protection for businesses in the event of a cyber attack. As the number and sophistication of cyber threats continue to increase, cybersecurity insurance has become an essential aspect of risk management for businesses of all sizes. In this blog post, we will discuss what cybersecurity insurance is, the types of coverage it offers, and whether or not your business needs it.

Read More
vulnerability assessment, cybersecurity Christian Grupp vulnerability assessment, cybersecurity Christian Grupp

How do vulnerability assessments and pen-testing impact my insurance?

Vulnerability assessments and penetration testing (pen-testing) are important aspects of cybersecurity that help identify and evaluate vulnerabilities in a computer system, network, or web application that could be exploited by cybercriminals. These assessments also play a crucial role in determining the level of insurance coverage a company can receive. In this blog post, we will discuss how vulnerability assessments and pen-testing impact insurance and the importance of conducting regular assessments for companies.

Read More
vulnerability assessment, cybersecurity Christian Grupp vulnerability assessment, cybersecurity Christian Grupp

Who needs vulnerability assessments?

Vulnerability assessments are an important aspect of cybersecurity, as they help identify and evaluate vulnerabilities in a computer system, network, or web application that could be exploited by cybercriminals. Determining who should run vulnerability assessments for a company can be a challenging task. The decision of who should run the assessment should be based on various factors such as the size of the company, risk profile, industry, regulatory environment, laws, insurance needs, and other elements that may be important in determining the scope and frequency of the assessments. In this blog post, we will discuss the different factors that should be considered when determining who should run vulnerability assessments for a company.

Read More
cybersecurity Christian Grupp cybersecurity Christian Grupp

What is a vulnerability assessment?

A vulnerability assessment is the process of identifying and evaluating the vulnerabilities in a computer system, network, or web application. These vulnerabilities can include weaknesses in software, hardware, or network configurations that could be exploited by cybercriminals to gain unauthorized access or disrupt operations. Vulnerability assessments are an important aspect of cybersecurity as they help organizations understand their vulnerabilities and take steps to improve their security.

Read More
pentest, cybersecurity, red team Christian Grupp pentest, cybersecurity, red team Christian Grupp

How often should I pen test my business?

Determining how often to conduct a penetration test for your company can be a challenging task. The frequency of your pen-tests should be based on various factors such as industry, size, and risk. In this blog post, we will discuss the different factors that should be considered when determining the frequency of your pen-tests and provide guidelines on how often your company should conduct them.

Read More