Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page

Case Study: Penetration Testing

by Peter Dietrich | Jan 9, 2020 | Case Study

Case Study Penetration Testing This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network. Intro How We...
CIS Control #17: Implement a Security Awareness and Training Program

CIS Control #17: Implement a Security Awareness and Training Program

by Perry Lynch | Sep 2, 2019 | Blog, CIS Critical Security Controls

3:20 min read | Security Awareness Training is one of the most cost-effective ways to improve your organization’s overall security posture. Most breaches are at least partly due to human error, and while nothing can be done to completely eliminate errors, a good...
CIS Critical Security Control #5: Controlled Use of Administrative Privileges

CIS Critical Security Control #5: Controlled Use of Administrative Privileges

by Peter Dietrich | Sep 14, 2018 | Blog, CIS Critical Security Controls

3:30 min read | A compromise of any account is a problem, but it’s especially serious when an outsider gains access to an administrative account. An intruder with full control of a device, website or database and can do serious damage. CIS Control #5’s message...

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises

Categories

Archives

  • ►2020 (4)
    • ►June (1)
    • ►February (1)
    • ►January (2)
  • ►2019 (11)
    • ►December (1)
    • ►November (1)
    • ►September (1)
    • ►August (1)
    • ►July (1)
    • ►June (1)
    • ►May (1)
    • ►April (1)
    • ►March (1)
    • ►February (1)
    • ►January (1)
  • ►2018 (28)
    • ►December (1)
    • ►November (1)
    • ►October (1)
    • ►September (1)
    • ►August (1)
    • ►July (4)
    • ►June (2)
    • ►May (2)
    • ►March (3)
    • ►February (3)
    • ►January (9)

Tags

account theft Administrative Privileges assessment audit log authorized Backup Boundary Defense Check Point CIS control configuration Cybersecurity Investment Incentive Cybersecurity Tax Credit Data Data Loss Prevention Data Protection Data Recovery devices Email Encryption exploit Firewall human security risk IDS Integrity inventory IPS Legislation Malware Network Device network port Network Segmentation password patching penetration test phishing Remote Router scan Security Control software Switch unauthorized vulnerability vulnerability scanning web browser
Tweets by Path2Protection

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises
  • CIS Control #19: Incident Response and Management
  • CIS Control #18: Application Software Security
  • CIS Control #17: Implement a Security Awareness and Training Program
  • CIS Critical Security Control #16: Account Monitoring and Control

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

BREACH RESPONSE HOTLINE:
breach@anchortechnologies.com
866.841.0777, option #8

  • Facebook
  • Twitter