Cybersecurity

The Expedition to Information Security [Infographic]

expedition-information-security

As the world continues to advance, organizations are utilizing new technologies for improving their operations. The abundance of these new and emerging tools facilitate the way organizations conduct business through seamless communication and data transmission. The significant threat regarding this movement are the various cyber security risks. Due to the value of data in this […]

Read More

7 Information Security Tips for Your Organization

7-security-tips

Do you take the necessary precautions to ensure your information is stored and secured safely online? As the internet plays a larger role in our daily activities, it is important to highlight the type and amount of information we share can be used against us. As a result, we compiled the top information security tips […]

Read More

Inside DEF CON 25

inside-defcon

What is DEF CON? DEF CON is an annual global hacking conference which brings together the brightest minds in information and it covers a variety of topics such as SMB replay attacks, web packet manipulation, and deauthentication attacks on wireless access points. This conference, now in its 25th year in existence, is an opportunity for […]

Read More

Employee Spotlight: Get to Know Senior Consultant Van Bettis

With DefCon coming up this weekend, A-LIGN would like to take the time to highlight one of our senior consultants, Van Bettis, who specializes in penetration testing. What is your role at A-LIGN? At A-LIGN, I perform penetration testing services for PCI-DSS, FISMA, and regular penetration testing. The types of penetration testing services that I […]

Read More

PCI DSS: Updated Penetration Testing Requirements – Frequently Asked Questions

pci-dss

Is your organization prepared for the upcoming PCI DSS requirement going into effect? To prepare your organization for this change, our team has assembled an FAQ to address any of your potential questions. Read now: What to Expect from PCI DSS 3.2 What is the new penetration testing requirement? Requirement 11.3.4.1 requires that organization perform […]

Read More

Choosing the Right Security Applications for Your Organization

security-applications

There are various methods to protect your computer from malware and other malicious attacks. Identifying the hardware, techniques, and software that work best for your organization is essential to having a system that can manage your entire business environment. Failing to do so can be risky: per a survey done by Ponemon Institute, the average cost […]

Read More

Types of Malware and How to Prevent Malware Attacks

Malware is ‘malicious software’ intended to damage, disable, or exploit computers or computer systems. It is a term most have become familiar with in the digital age because of its high presence and problematic consequences. Furthermore, the use of malware continues to dramatically increase and evolve each year. G DATA Security reported that in 2016, […]

Read More

2017 Cyber Defense Guide: Part 2 [Free Download]

Malware and Social Engineering As industries see an influx use of technology in day-to-day business operations, the cybersecurity landscape struggles to keep up and stay ahead of attackers. Read more: Cyber Defense Guide: Part 1 Data breaches can happen anywhere at any time. A common misconception is that breaches can only be executed through malicious […]

Read More

2017 Cyber Defense Guide: Part 1 [Free Download]

Don’t be ambushed by a cyberattack. In 2016, there were more than 4 billion data records stolen globally. Organizations at every level have been breached by hacks over the course of last year, but are there signs of hacks slowing down? So far in 2017, the following hacks and data breaches have been announced: Esea […]

Read More

New York Instates First Mandated Cybersecurity Law

Due to the increasingly significant threat of cybercrime on businesses and consumers, New York has released cybersecurity requirements for financial services companies in the state of New York. While the SEC currently mandates that organizations need to implement “reasonable safeguards to protect a client’s nonpublic information,” the new law provides more clarity for organizations to […]

Read More