Blog Posts

audit, cybersecurity, ISO 27001, soc 2, hipaa, PCI-DSS Christian Grupp audit, cybersecurity, ISO 27001, soc 2, hipaa, PCI-DSS Christian Grupp

What are the most common cybersecurity audits for businesses? How do they differ?

Cybersecurity audits are an essential aspect of protecting a business from cyber threats. These audits help businesses identify vulnerabilities in their systems and networks, and provide guidance on how to mitigate those risks. There are several different types of cybersecurity audits that businesses can choose from, each with its own unique set of pros and cons.

Read More
cybersecurity, password manager Christian Grupp cybersecurity, password manager Christian Grupp

What are the pros and cons of using a password manager?

A password manager is a software application that helps users to securely store and manage their passwords. These tools have become increasingly popular as the number of online accounts and services that require a login continues to grow. But like any software, a password manager comes with its own set of pros and cons.

Read More
pentest, offense, sql injection, TT&P, cybersecurity Christian Grupp pentest, offense, sql injection, TT&P, cybersecurity Christian Grupp

What is SQL Injection?

SQL injection is a type of cyber attack that exploits a vulnerability in the way a website or application interacts with a database. It allows an attacker to insert malicious code into a SQL statement, which is then executed by the database. This can give the attacker access to sensitive information, such as passwords, personal data, and even financial information.

Read More
act of war, cybersecurity, insurance Christian Grupp act of war, cybersecurity, insurance Christian Grupp

Acts of war and cybersecurity - am I still insured?

Cybersecurity is a growing concern for businesses of all sizes, and the threat of cyber attacks is no longer limited to just hacking and data breaches. In recent years, acts of war have also been added to the list of potential cyber threats that businesses need to consider. As a result, many business owners are left wondering if they will still be covered by their insurance policies in the event of a cyber-attack that is considered an act of war.

Read More
red teaming, red team, offense, cybersecurity Christian Grupp red teaming, red team, offense, cybersecurity Christian Grupp

What is red teaming in cybersecurity?

Red teaming in cybersecurity is a simulated cyberattack scenario that is conducted by a team of experts to test an organization's security defenses and identify vulnerabilities. The goal of red teaming is to mimic the tactics, techniques, and procedures (TTPs) of real-world attackers in order to evaluate the effectiveness of an organization's security measures and identify areas for improvement.

Read More

What are table-top exercises in cybersecurity?

Table-top exercises (TTX) in cybersecurity are a type of training that simulates real-world cyber threats and incidents. They are designed to help organizations prepare for and respond to cyber incidents by providing a controlled environment for employees to practice and test their incident response plans.

Read More

What governmental agencies help if I am hacked?

If a small business falls victim to a cyber attack, there are a number of governmental agencies that can provide assistance. The primary agency responsible for investigating and responding to cyber incidents is the Federal Bureau of Investigation (FBI). The FBI's Cyber Division is responsible for investigating cyber-based terrorism, espionage, and computer crime. They have a number of field offices located throughout the United States, and they also have a number of partnerships with state and local law enforcement agencies.

Read More

What goes into a Security Event Playbook?

A security event playbook is a comprehensive document that outlines the procedures and protocols that should be followed in the event of a security incident. It is a critical tool for organizations of all sizes and industries, as it helps to ensure that all relevant personnel are aware of the steps they should take to minimize the impact of a security incident.

Read More

What is a Security Event Playbook?

A security event playbook is a document that outlines the procedures and protocols that a company should follow in the event of a security incident. It is a set of guidelines that detail the steps that should be taken to detect, respond to, and recover from a security event, such as a cyber attack, data breach, or other security incident. This document is designed to be used by an organization's security team and other relevant personnel in the event of a security incident.

Read More