Stages of Penetration Testing According to PTES

by Sarah Harvey / November 3, 2023

What is the Penetration Testing Execution Standard (PTES)? The Penetration Testing Execution Standard, or PTES, is a standard that was developed and continues to be enhanced by a group of information security experts from various industries. PTES provides a minimum baseline for what is required of a penetration test, expanding from initial communication between client and tester to what a report includes. The goal of PTES is to provide quality…

Think Like a Hacker: Common Vulnerabilities Found in Networks

by Sarah Harvey / February 20, 2023

What’s the Difference Between Internal and External Networks? Let’s face it: anything connected to the Internet is at risk of being compromised, which means that organizations like yours must understand the types of vulnerabilities in your internal and external networks that could be exploited by a malicious hacker. If you’re interested in learning about common ways your networks may be compromised by a malicious hacker, remediation tactics for mitigating threats…

Preparing for CCPA: 4 Data Privacy Best Practices to Follow

by Sarah Harvey / December 15, 2022

The California Consumer Privacy Act has been regarded as the United States' strictest data privacy law of our time, and yet, many organizations still don’t know where to start with their compliance efforts. Does the law even apply to them? How can they ensure compliance? What are the steps they need to take? While no one journey toward CCPA compliance is the same, we’ve rounded up four data privacy best…

Best Practices for Configuring Your AWS Perimeter

by Sarah Harvey / December 15, 2022

Could what happened at Capital One happen at your organization? As a business owner, stakeholder, or IT personnel, that’s the unavoidable fear that appears when you hear about the latest data breach. The Capital One data breach is one of the most damaging data breaches of 2019, and we’ll continue to learn about the repercussions for months to come. This data breach impacts 100 million individuals in the United States…

Onsite Audits for Cloud Environments

by Sarah Harvey / February 20, 2023

Why Onsite Audits are Necessary for Cloud Environments Do you provide cloud solution services? Or, does your organization utilize the services of cloud providers? At KirkpatrickPrice, we understand that it’s important to recognize the value of cloud environments and technology, while also understanding the risk that is coupled with storing data in the cloud. Whether you provide the cloud service or use it for your business, you should know that…