PEN Consultants Logo
Don’t Be a Victim: Find your weaknesses before the criminals do. PEN Consultants can help!

Category: Miscellaneous

2024-05-06

Methodology

This is one of the most common questions we hear from clients during kick-off meetings. Maybe you have heard it or asked it yourself… The question is: What is your pentesting methodology? Most pentesting firms provide vague, high-level answers to this question. We don’t. Not only do we provide a detailed response during the kick-off, […]

2024-04-23

SMB Signing

The book of John says a good shepherd knows his sheep and his sheep know him. In cybersecurity, SMB Signing is similar to the shepherd-sheep relationship by verifying the identity of those connecting to your network shares, thus preventing Information Disclosure, MiTM attacks, spoofing, replay, data corruption, and more! SMB signing, present in the Server […]

2024-04-21

DMARC

When was the last time you reviewed your email security settings? If you are like most people, it probably isn’t recently. And yet, if not properly configured, an attacker could potentially spoof your email domain and send email messages to employees, or even clients, that appear to be coming from your email service! One configuration […]

2024-04-17

Unique Experience

Our unique approach sets us apart – former NSA experts on every engagement ensuring quality, compliance, and unparalleled results. See why our clients continue to choose us after experiencing our superior quality. Source: https://www.youtube.com/watch?v=B5S2Df7SPeM VIDEO TRANSCRIPT INTERVIEWER QUESTION:What specifically makes you unique compared to other firms in terms of experience?ROBERT:Well, with our Nation-state-level hacker experience…It’s […]

2024-04-09

Security Vendor Priorities

Wondering if your cybersecurity provider puts your security first? Ask for a list of dropped vendors due to security flaws. Their response will speak volumes about their priorities!

2024-04-06

Unique to PEN Consultants – Summary

Discover a new standard in offensive security! This video highlights PEN Consultants’ Experience, Transparency, and Values – all of which make us unique. Source: https://www.youtube.com/watch?v=lZCmRKtIHaU VIDEO TRANSCRIPT

2024-04-03

Timely Patch Management

Don’t underestimate the risks of known vulnerabilities. They could have extreme consequences, including, but not limited to, defacement of content, serious brand reputation issues, inclusion of malware and links to malware, ransomware, data breaches, etc. Example patch time policies: It is understood that patching, on occasion, can have unintended availability side effects. Nevertheless, it is […]

2024-03-25

King Solomon and Authentication Security

King Solomon said, “A cord of 3 strands is not easily broken.” In cybersecurity, authentication using an unpredictable username convention, strong password policy, and securely configured MFA cannot easily be compromised. Usernames: Password Policy: MFA: Featured image is a derivative work from the following images: https://pixabay.com/photos/rope-knot-string-strength-cordage-3052477/

2023-09-29

Mentoring Sessions

We had amazing conversations at our first monthly group mentoring session today! Thanks to all who were able to join us. The group-based mentoring model approach allowed attendees to share various perspectives on topics discussed. The insight gained was invaluable! We’ve had a lot of inquiries about our free monthly group mentoring sessions, so we […]

2023-08-26

Annual Team Mission Trip (2023)

As part of the non-traditional benefits we extend to all team members, this year, PEN Consultants was pleased to add – for the first time – a mission trip. Each of our team members (and one of their family members) had the opportunity to participate at no charge to them. Click here for more information […]

magnifiercrosschevron-down