Cybersecurity Consulting and Education

What We Do

At Ensurtec, our focus is on the survival of your business through security in-depth. Malware is becoming more complex and falls into the hands of more people than ever before. Nation state hacking groups have lost control of their powerful weapons, and anyone can purchase these weapons online. End user and executive board education, and proper security controls are essential tools in today's connected world. We are passionate about our craft, and dedicated to securing the information and networks of our clients.

Risk Assessments

We conduct HIPAA, PCI, and non-compliance risk assessments to check for gaps in your security controls.

Network Security

We take a holistic approach to network security by offering installation and configuration of spam filters, firewalls, endpoint protection, hardening of servers and workstation, and physical security.

Security Awareness Training

Many times the end user is the first line of defense or the last line of defense, and by having an educated workforce the likelihood of a successful attack is greatly reduced.

Our Partners

Recent Posts

  • utility infrastructureUtility Infrastructure – The Clock is Ticking
    Supervisory Control and Data Acquisition (SCADA) systems and Industrial Control Systems (ICS) are responsible for the operation of electrical, sewage/water, and waste disposal nationwide. When ICS’s were developed and deployed in the early days of computers, security wasn’t a concern. […]
  • aggressive hash crackingAggressive Hash Cracking with Clouds and Chains
    Summary Password cracking might be my favorite attack vector in the modern IoT landscape. There’s just something magical about firing up hashcat or John the Ripper and pitting your hardware against the product of questionable, human password choices. Let’s begin with a brief walkthrough of hashcat. For those unfamiliar, a hash is an encrypted string of text, usually password text in the context of Information Security. Supporting a lot of different hashing algorithms, hashcat has an option for cracking almost any kind of hash. […]