Barron Rosborough

Barron Rosborough

Recent Posts

Jul 12, 2018 12:12:57 AM

Do You Collect Personal Data in Europe? GDPR Applies!

Calculating the cost of GDPR compliance The EU General Data Protection Regulation (GDPR) is unique in the field of compliance standards for its establishment of financial penalties for the loss or mismanagement of personal data of EU citizens. And those fines are higher and more likely to be assessed than any existing standard. Any company that does business with EU citizens (or controls or proces...
Jul 12, 2018 12:07:26 AM

Why Scan?

Why scan? Most site owners underestimate the danger and overestimate the cost of securing their sites and servers against attacks. Having a site taken down by malicious activity costs days worth of lost sales and thousands of dollars in IT time. Maintaining normal and reasonable security is not expensive - getting hacked is. WSSA security: what is it worth to you? The vast majority of successful a...
Jul 11, 2018 11:04:51 AM

Defending against Malware

Defending against Malware has focused on reactive technologies: intrusion detection, content filtering, detecting and blocking malware, etc. Time to get proactive. Reactive Malware Defense Technologies There is an ongoing argument as to how effective those reactive technologies are. There's no argument about the fact that most of these solutions require very competent operators: without a good adm...
Jul 10, 2018 1:21:21 PM

Web Security Basics

Web security, your site and your network Web sites are unfortunately prone to security risks. And so are any networks to which web servers are connected. Setting aside risks created by employee use or misuse of network resources, your web server and the site it hosts present your most serious sources of security risk. Web servers by design open a window between your network and the world. The care...
Jul 10, 2018 1:10:12 PM

Penetration Testing Tools You Can Use

Pen testing always includes a vulnerability assessment Penetration testing is all about identifying network security weaknesses before they are exploited internally or externally. The best pen testers bring a range of tools and experience to each gig and a key tool they will use is vulnerability assessment. The experience level, tools used, findings and the report you get from each penetration tes...
Jul 9, 2018 1:03:01 PM

Vulnerability Management Software, an Essential Piece of the Security Puzzle

  Vulnerability Management Software No single security solution can make a network safe from all attacks. Firewalls and IPS can't keep workstations free of viruses and malware. Antivirus can't protect the data on a database server. So it's a matter of balancing multiple solutions. To understand how these solutions complement each other, let's look at some of the most common security solutions (thi...