Uncategorized

  • Cyber Security/Response Plan Preparedness in Trucking

    Cyber Security/Response Plan Preparedness in Trucking Authored by Lindsay Timcke ; Director, IT & Cyber Going back 10-20 years ago the biggest threats to your trucking business were fuel costs, the weather and staffing. Then, almost appearing overnight the internet came into the picture and soon dominated the conversations surrounding Incident Response (IR), Disaster Recovery (DR) and […]

    Read More

  • Lloyd’s to Exclude Nation State Attacks from Cyber Insurance Coverage

    Earlier this month, Lloyd’s of London announced in a market bulletin that they will cease their nation state attack insurance coverage beginning in April 2023. While there is a growing demand for cyber liability insurance as cyber-attacks grow in frequency, severity, and sophistication, Lloyd’s identifies cyber related insurance as an evolving risk for their business.

    Read More

  • GLBA Safeguards Rule Update

    An updated rule for GLBA safeguards may mean some financial institutions need to review their security and handling practices. Is your organization prepared to navigate these complex decisions by the December 2022 deadline? Check out this article by Kadian Douglas that explains the FTC GLBA Safeguards Rule.

    Read More

  • Build Your Own OSINT APIs for Pen Testers

    tend to rely heavily on open-source intelligence (OSINT) data sources and APIs. This blog post is all about the value of mining OSINT data ourselves, and shows how to index very large datasets for quick searches.

    Read More

  • Higher Ed – Cybersecurity Webinar

    Please join us for our latest webinar in our Higher Education Webinar Series. Zoran Jovic, a senior cybersecurity consultant, will be covering cybersecurity topics, such as email phishing and passwords attacks, and discussing mitigation strategies to better protect your environment. Date: October 27, 2021 Time: 1:00 pm – 2:00 pm central Link to Webinar https://www.claconnect.com/events/2021/webinar-series-higher-education-hot-topics-and-updates […]

    Read More

  • The Art of Exploitation: Domain Admin from the Internet via eTRAKiT

    In this post, we will look at a SQL injection vulnerability within the eTRAKiT web application without authenticating to the web application and resulting in obtaining a remote connection to the backend database.

    Read More

  • Cybersecurity in Higher Education – People, Process, and Associated Risks

    Authored by Jacob Paullus

    Information Technology and Information Security are some of the most important yet most complicated ecosystems to construct in a Higher Education environment. Between students, staff, and faculty, many of these institutions have a larger technological footprint than some of the largest companies in the world.

    Read More

  • Splash Pages/Captive Portals for Corporate Guest Wireless Networks

    Authored By: Jennifer Friel What is a Splash Page/Captive Portal?   A Splash Page/Captive Portal is a page which users are directed to prior to connecting to a Guest Wireless Network. On this page, the user is required to view and interact with the page prior to being allowed access to any other sites or web connections through the network.   Why a Splash Page /Captive Portal?   While […]

    Read More

  • Secure the Zone When You’re at Home

    Often, we only think of good cybersecurity practices in the workplace, and when we get home it’s not as important to us. Good cyber safety practices should start at home. With the ever-increasing number of connected devices, we must be vigilant in ensuring we protect ourselves and children and truly have comfort at home. Below […]

    Read More

  • Think! Before You Click The Link.

    Statistics show that over 90% of cyber-attacks are a result of successful email phishing campaigns.

    Read More