PEN Consultants Logo
Don’t Be a Victim: Find your weaknesses before the criminals do. PEN Consultants can help!

Category: Miscellaneous

2024-04-21

DMARC

When was the last time you reviewed your email security settings? If you are like most people, it probably isn’t recently. And yet, if not properly configured, an attacker could potentially spoof your email domain and send email messages to employees, or even clients, that appear to be coming from your email service! One configuration […]

2024-04-17

Unique Experience

Our unique approach sets us apart – former NSA experts on every engagement ensuring quality, compliance, and unparalleled results. See why our clients continue to choose us after experiencing our superior quality. Source: https://www.youtube.com/watch?v=B5S2Df7SPeM VIDEO TRANSCRIPT INTERVIEWER QUESTION:What specifically makes you unique compared to other firms in terms of experience?ROBERT:Well, with our Nation-state-level hacker experience…It’s […]

2024-04-09

Security Vendor Priorities

Wondering if your cybersecurity provider puts your security first? Ask for a list of dropped vendors due to security flaws. Their response will speak volumes about their priorities!

2024-04-06

Unique to PEN Consultants – Summary

Discover a new standard in offensive security! This video highlights PEN Consultants’ Experience, Transparency, and Values – all of which make us unique. Source: https://www.youtube.com/watch?v=lZCmRKtIHaU VIDEO TRANSCRIPT

2024-04-03

Timely Patch Management

Don’t underestimate the risks of known vulnerabilities. They could have extreme consequences, including, but not limited to, defacement of content, serious brand reputation issues, inclusion of malware and links to malware, ransomware, data breaches, etc. Example patch time policies: It is understood that patching, on occasion, can have unintended availability side effects. Nevertheless, it is […]

2024-03-25

King Solomon and Authentication Security

King Solomon said, “A cord of 3 strands is not easily broken.” In cybersecurity, authentication using an unpredictable username convention, strong password policy, and securely configured MFA cannot easily be compromised. Usernames: Password Policy: MFA: Featured image is a derivative work from the following images: https://pixabay.com/photos/rope-knot-string-strength-cordage-3052477/

2023-09-29

Mentoring Sessions

We had amazing conversations at our first monthly group mentoring session today! Thanks to all who were able to join us. The group-based mentoring model approach allowed attendees to share various perspectives on topics discussed. The insight gained was invaluable! We’ve had a lot of inquiries about our free monthly group mentoring sessions, so we […]

2023-08-26

Annual Team Mission Trip (2023)

As part of the non-traditional benefits we extend to all team members, this year, PEN Consultants was pleased to add – for the first time – a mission trip. Each of our team members (and one of their family members) had the opportunity to participate at no charge to them. Click here for more information […]

2023-07-28

Annual Team Meet-Up (2023)

PEN Consultants held its annual meet-up June 8-11, 2023, giving team members the opportunity to meet each other face-2-face, participate in team-building activities, and give back to the community by helping those who are disadvantaged and in need. Here is a summary of that event. Thursday Hill Country Daily Bread Serving at a ministry we […]

2021-11-03

Vulnerability Disclosure Policy

Vulnerabilities are everywhere. You can be assured your systems have them. There is a good chance the vulnerabilities in your systems may be discovered by an outside party. Do you have internal policies and procedures in place on how to deal with that when it happens? Do you have a public version of that posted? […]

magnifiercrosschevron-down