Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page

Case Study: Penetration Testing

by Peter Dietrich | Jan 9, 2020 | Case Study

Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
CIS Control #17: Implement a Security Awareness and Training Program

CIS Control #17: Implement a Security Awareness and Training Program

by Perry Lynch | Sep 2, 2019 | Blog, CIS Critical Security Controls

3:20 min read | Security Awareness Training is one of the most cost-effective ways to improve your organization’s overall security posture. Most breaches are at least partly due to human error, and while nothing can be done to completely eliminate errors, a good...
CIS Critical Security Control #5: Controlled Use of Administrative Privileges

CIS Critical Security Control #5: Controlled Use of Administrative Privileges

by Peter Dietrich | Sep 14, 2018 | Blog, CIS Critical Security Controls

3:30 min read | A compromise of any account is a problem, but it’s especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message...

Recent Posts

  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management (TPRM)
  • Vendor Risk Management (VRM)- How to Establish Trust

Categories

Tags

account theft Administrative Privileges assessment authorized CIS control CMMC CMMC Compliance Compliance Compromise configuration Cyber culture at work Data Data Loss Prevention Data Protection Department of Defense devices DoD Email Encryption Ethical Hack exploit Firewall gap analysis human security risk Integrity inventory myCYPR Network Device password patching penetration test phishing Risk Management Risk Rating RSA Conference scan Security Control software Test third-party third-party risk unauthorized Vendor security vulnerability vulnerability scanning
Tweets by Path2Protection
  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management (TPRM)
  • Vendor Risk Management (VRM)- How to Establish Trust
  • Compliance Management via the Calendar and Automation
  • Creating a Culture of Cybersecurity at Work
  • What are Cybersecurity Risk Ratings?
  • Physical Security and Cyber Risk Management

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

Privacy Policies

BREACH RESPONSE HOTLINE: breach@anchortechnologies.com 866.841.0777, option #8

  • Facebook
  • Twitter