Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page
Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020

Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020

by Peter Dietrich | Feb 14, 2020 | News

Anchor Technologies will participate in the RSA Conference this year! We will be in the expo at booth 5355. This booth and conference will serve as the official launch for the myCYPR™ cybersecurity ratings platform. myCYPR™ is the COMPLETE cybersecurity ratings...

Case Study: Penetration Testing

by Peter Dietrich | Jan 9, 2020 | Case Study

Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
CIS Critical Security Control #10: Data Recovery Capability

CIS Critical Security Control #10: Data Recovery Capability

by Peter Dietrich | Feb 18, 2019 | Blog, CIS Critical Security Controls

3:45 min read |  In the event of a security breach of your network, it is likely that the attackers have altered or destroyed important data and security configurations. The tenth CIS control, data recovery capabilities, addresses the importance of backing-up system...
CIS Critical Security Control #9: Limitation & Control of Network Ports, Protocols and Services

CIS Critical Security Control #9: Limitation & Control of Network Ports, Protocols and Services

by Peter Dietrich | Jan 3, 2019 | Blog, CIS Critical Security Controls

4:00 min read | Transmitting and receiving data via network ports is a necessary evil. Because your network process uses a specific port to communicate to another port there is no avoiding the inherent risk. The most perilous services on a network are the ones you...
CIS Critical Security Control #8: Malware Defenses

CIS Critical Security Control #8: Malware Defenses

by Peter Dietrich | Dec 11, 2018 | Blog, CIS Critical Security Controls

4:30 min read | Malware is a type of computer program designed to infect a legitimate user’s computer with the intent to inflict harm. Malware comes in various forms such as, viruses, Trojans, spyware, worms, etc. Malware is a huge and growing problem, costing...
« Older Entries

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises

Categories

Archives

  • ►2020 (4)
    • ►June (1)
    • ►February (1)
    • ►January (2)
  • ►2019 (11)
    • ►December (1)
    • ►November (1)
    • ►September (1)
    • ►August (1)
    • ►July (1)
    • ►June (1)
    • ►May (1)
    • ►April (1)
    • ►March (1)
    • ►February (1)
    • ►January (1)
  • ►2018 (28)
    • ►December (1)
    • ►November (1)
    • ►October (1)
    • ►September (1)
    • ►August (1)
    • ►July (4)
    • ►June (2)
    • ►May (2)
    • ►March (3)
    • ►February (3)
    • ►January (9)

Tags

account theft Administrative Privileges assessment audit log authorized Backup Boundary Defense Check Point CIS control configuration Cybersecurity Investment Incentive Cybersecurity Tax Credit Data Data Loss Prevention Data Protection Data Recovery devices Email Encryption exploit Firewall human security risk IDS Integrity inventory IPS Legislation Malware Network Device network port Network Segmentation password patching penetration test phishing Remote Router scan Security Control software Switch unauthorized vulnerability vulnerability scanning web browser
Tweets by Path2Protection

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises
  • CIS Control #19: Incident Response and Management
  • CIS Control #18: Application Software Security
  • CIS Control #17: Implement a Security Awareness and Training Program
  • CIS Critical Security Control #16: Account Monitoring and Control

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

BREACH RESPONSE HOTLINE:
breach@anchortechnologies.com
866.841.0777, option #8

  • Facebook
  • Twitter