The Weidenhammer Blog

Vulnerability Assessment vs. Penetration Testing – “Yea, that’s what I want!”

June 28th, 2016 | Category: Business Consulting, Network Security, Technology

As I continue to engage prospective clients regarding their security needs, there seems to be clear confusion in the industry regarding the difference between Vulnerability Assessments and Penetration Testing.   Vulnerability Assessment Surprisingly, whether you are required to conduct security assessments due to regulatory requirements or if you are simply taking steps to establish or…

Share
Read More

An Epidemic in Healthcare Security

September 18th, 2014 | Category: Network Security

A recent article in USA Today proclaimed there is an epidemic of medical identity theft. From the Affordable Care Act’s HealthCare.gov Website to the immense data breach that recently took place at Community Health Systems, there is no question that attacks in the healthcare world are on the rise. So just how rampant are security…

Share
Read More

CIO Mindset – Enable and Govern

April 9th, 2014 | Category: Network Security

Historically the role of the CIO was to centralize and control IT resources and data and then somehow move the organization forward.  Frequently that meant saying NO to users with routine and even innovative requests. A recent post by one of my Weidenhammer colleagues got me thinking about a better approach to moving the business…

Share
Read More

Critical Security Controls Permeate Everything We Do

January 30th, 2014 | Category: Network Security

I recently attended a local security session that highlighted the TARGET data breach and procedural deficiencies many organizations have in their operations. Per the speaker, Lance Hawk of Computer Forensics & IT Security, the highly publicized data breach was the result of a hack of Target’s Point-of-Sale (PoS) system using malware called Dexter.  The PoS…

Share
Read More