The Weidenhammer Blog

Vulnerability Assessment vs. Penetration Testing – “Yea, that’s what I want!”

June 28th, 2016 | Category: Business Consulting, Network Security, Technology

As I continue to engage prospective clients regarding their security needs, there seems to be clear confusion in the industry regarding the difference between Vulnerability Assessments and Penetration Testing.   Vulnerability Assessment Surprisingly, whether you are required to conduct security assessments due to regulatory requirements or if you are simply taking steps to establish or…

Share
Read More

Practicing Online Safety This Holiday Season

December 1st, 2015 | Category: Business Consulting, Network Security

Although Cyber Monday has come and gone, ensuring appropriate online safety must continue to be practiced throughout the year. In this blog post, we will examine a very common form of malware, detailing both irregularities to look out for, as well as ways to combat the threat. One increasingly consistent form of malware is CryptoLocker.…

Share
Read More

Public cloud criteria for a strong IT infrastructure

November 9th, 2015 | Category: Business Consulting, Cloud Computing

Public cloud services have become integral to enterprise success, offering flexibility, security and cost-effectiveness for businesses of all types and sizes. However, not all public clouds are created equal, and decision-makers need to be discerning when they pick a provider. Here are five criteria to follow during the search for an ideal public cloud service.…

Share
Read More