Patch management refers to the process of identifying, acquiring, testing, and installing software updates (also known as patches) to an organization's systems.| PurpleSec
Data Loss Prevention is a strategy that detects potential data breaches or data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).| PurpleSec
Is your business prepared to handle the most common types of network vulnerabilities? Find out here...| PurpleSec
The main different between an IDS and IPS is that an IDS sends alerts when suspicious events are identified while an IPS reacts and prevents attacks in progress from reaching targeted systems and networks.| PurpleSec
A phishing campaign is comprised of 8 steps including sending a questionnaire, crafting email templates, defining the vishing and/or smishing scenario, getting stakeholder buy in, performing the test, reporting on findings, and conducting security awareness training.| PurpleSec
There are three main types of security controls including technical, administrative, and physical. Most controls in cyber security can be classifed as one of these three types.| PurpleSec
You can implement social engineering awareness training by developing policies, defining resources and toolsets, creating phishing campaigns, reporting on findings, and following up with online or in-person training.| PurpleSec
The different types of penetration tests include network services, web application, client side, wireless, social engineering, and physical.| PurpleSec
Information and cybersecurity policies are the foundation of building any security program. Get a step ahead of your cybersecurity goals by stealing a copy of our security policies today!| PurpleSec
Endpoint detection and response (EDR) provides an additional layer of endpoint protection that is lacking with traditional anti-virus software.| PurpleSec