Cybersecurity Consulting and Education
What We Do
At Ensurtec, our focus is on the survival of your business through security in-depth. Malware is becoming more complex and falls into the hands of more people than ever before. Nation state hacking groups have lost control of their powerful weapons, and anyone can purchase these weapons online. End user and executive board education, and proper security controls are essential tools in today's connected world. We are passionate about our craft, and dedicated to securing the information and networks of our clients.
We conduct HIPAA, PCI, and non-compliance risk assessments to check for gaps in your security controls.
We take a holistic approach to network security by offering installation and configuration of spam filters, firewalls, endpoint protection, hardening of servers and workstation, and physical security.
Security Awareness Training
Many times the end user is the first line of defense or the last line of defense, and by having an educated workforce the likelihood of a successful attack is greatly reduced.
- What Can a Hacker Do With Your Email Address?By Ryan MillerEmail might seem trivial to some people, but if you are active in using the internet to bank, shop, conduct research, ship items, sell items at auction, and a myriad of other activities your life revolves around email. If a hacker were able to take over your email account they could reset passwords to all of your online accounts and determine what your security question answers are based on the interests the hacker would discover in the content of your emails. It’s important to have application based two-factor authentication, not email or SMS (text message). If you are unsure about what you should do in the event your email account is taken over by a hacker, check here. […]
- Processor and Kernel Memory BugBy Ryan MillerThere are two new vulnerabilities called Meltdown and Spectre with the latter affecting nearly every device in the world. That’s billions of devices. Meltdown and Spectre have been known vulnerabilities for quite some time, but research teams had been under embargo. Details began to trickle out yesterday, and as a result of that trickle, there was a lot of speculation that led to many inaccurate assumptions about the full extent of the vulnerabilities and who and what was affected. […]