About Us | Contact Us
View Cart
Archive for 'Articles' Category

The Board’s Role in Cybersecurity

By Sofia Tafoya - Last updated: Friday, April 12, 2019

R-7 – The Top Seven Risks – 2019

By Vigilize - Last updated: Friday, April 12, 2019

Asus Malware Highlights The Risk of Supply Chain Attacks

By Vigilize - Last updated: Monday, April 8, 2019

The malware was distributed through Asus’ own tool, and was signed with a valid certificate… An article review. When it comes to avoiding malware and other internet attacks, most users know you should avoid downloading files from unknown sources—but a recent attack targeting Asus customers is a reminder that sometimes even that may not be […]


Bitlocker Attack Puts Data At Risk

By Vigilize - Last updated: Monday, April 1, 2019

A simple $30 part and publicly available code allowed access to keys… An article review. Researchers recently announced a new successful attack against Bitlocker, a full-disk encryption tool that has built into Windows since Vista, and the attack is surprisingly simple in its execution. The attack, detailed in an article submitted to us by our […]


Can You Trust Your TPM?

By Vigilize - Last updated: Monday, March 18, 2019

Attacks on AMD Trusted Platform Modules raise security questions. An article review.  Last year it was revealed that AMD Epyc and Ryzen CPUs were vulnerable to a series of attacks targeting their Secure Coprocessor–an entirely independent processor that can not be monitored or modified by the host machine. The Secure Coprocessor also hosts the Trusted […]


Sign-In Kiosks May Be Putting You At Risk

By Vigilize - Last updated: Monday, March 11, 2019

New research reveals issues with these commonly overlooked devices… An article review. With computers involved in our lives and businesses in so many ways, it can seem like we’re always being warned of another overlooked device that is ready to wreak havoc. While the attention of many security researchers has been focused on the rise […]


Microsoft Discontinues Support For SHA-1

By Vigilize - Last updated: Monday, March 4, 2019

Known to be vulnerable since 2005, the algorithm will be phased out over the next several months… An article review. Things can move slowly in the world of cryptography, and for evidence of that one needs to look no further than SHA-1–the hash algorithm introduced in 1995, found to be vulnerable to attack in 2005 […]


New Exploits Turn ATM Hacking Into a Game

By Vigilize - Last updated: Monday, February 25, 2019

Hackers are getting unusually creative in their attacks… An article review. One drawback of limiting the scope of our annual review articles (the M-7, T-7 and R-7) to seven items is that we don’t always get to include every subject we’d like to. Luckily we had our friend Wes Pollard to point out a great […]


“Think Secure ” Awareness Poster

By Sofia Tafoya - Last updated: Wednesday, February 20, 2019

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  


Why The Polar Vortex Wasn’t So Bad After All!

By Vigilize - Last updated: Monday, February 18, 2019

Winter weather does its part to help catch a robber… An article review. This time of year the winter weather can get anyone feeling down, so when our friend Joe Cychosz sent us this humorous article we felt like we had to pass it along! It seems that a bank robber in central Maine was […]