The 5 Different Penetration Testing Methodologies

The 5 Different Penetration Testing Methodologies

The only way to truly safeguard your business against attacks is to approach your network the same way cybercriminals would approach it: by trying to penetrate it. Choosing the optimal penetration testing methodology can help you identify the areas where your network...
How Much Does Penetration Testing Cost?

How Much Does Penetration Testing Cost?

Over the past decade, the number of data breaches in the U.S. has risen over 151% from 662 data breaches in 2010 to 1,001 data breaches in 2020. Affecting more than 155.8 million individuals, the need to safeguard sensitive data and network security is at an all-time...
8 Major Types of Penetration Testing

8 Major Types of Penetration Testing

  In 2020, the average cost to businesses that experienced a data breach was $150 million. And with hacking via attack vectors making up over half of the world’s most recent data breaches worldwide (the other half is made up of phishing and malware), the threat...
Common Network Vulnerabilities & Cyber Security Threats

Common Network Vulnerabilities & Cyber Security Threats

With an increasing reliance on remote work and digital communication, businesses are facing more cyber security risks than ever before—and closing your network vulnerabilities is the key to minimizing that risk. Take ransomware, for instance (just one of the types of...

Are We More Vulnerable to Hackers?

January 14, 2021, “Are we more vulnerable to hackers?” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber) describes how complexity in technology can lead to issues and notes how disclosure requirements make it seem as if attacks are more...

Spike in COVID-19 cases forcing to work from home

November 9, 2020, “Spike in COVID-19 cases forcing more Coloradans to work from home” Donald McLaughlin, Lead Consultant of Cornerstone Partners (CP Cyber) notes common pitfalls that can lead to compromises in your company’s security. He answers...