Call Us: 1-866-802-9405
Providing you with the latest information on

Security Insights

Defense Strategies for Minimizing Cyber Threats

The inevitable can happen. Balanced approaches between hardware and software solutions are only part of the solution to protect corporate assets regularly. Security testing, preparation, and collaboration are essential in the performance of your business. Protect your organization with precautionary defensive steps that help minimize major security threats. For more information, click here
Read More

Cyber Security News and Product Reviews: June 2018

In the world of Cyber Security, it’s important to know which products are beneficial or not. Recently, we created a team of experts to test and review the latest Cyber Security products based off a breakdown of their features, documentation, value for money, performance, support, ease of use, and overall rating out of five stars....
Read More

Cyber Security News and Product Reviews: May 2018

In the world of Cyber Security, it’s important to know which products are beneficial or not. Recently, we created a team of experts to test and review the latest Cyber Security products based off a breakdown of their features, documentation, value for money, performance, support, ease of use, and overall rating out of five stars....
Read More

Security and Compliance Part 3: Security Does Not Mean Compliance

Welcome to part three of our 3-part series about security and compliance. For those of you who missed part one or two, feel free to follow these links to get up to speed on this series: Part 1: Related but Not the Same, and Part 2: Compliance Means We’re Secure, Right? In the previous two...
Read More

Cyber Security News and Product Reviews: April 2018

In the world of Cyber Security, it’s important to know which products are beneficial or not. Recently, we created a team of experts to test and review the latest Cyber Security products based off a breakdown of their features, documentation, value for money, performance, support, ease of use, and overall rating out of five stars....
Read More

Security and Compliance Part 2: Compliance Means We’re Secure, Right?

Welcome to part 2 in our 3 part series about security and compliance. For those of you who missed part one, feel free to give it a quick read here. When the need for compliance hits your organization, many things can be involved, such as hiring outside consultant help, purchasing new hardware and software, even...
Read More

Pentagon Warns CEOs: Protect Your Data or Lose Our Contracts

Deputy Defense Secretary Patrick Shanahan says cybersecurity should be a top priority for its contractors.
Read More

Security Vitals Secures Contract with Haymarket Media, Publisher of SC Magazine

Security Vitals will be collaborating with Merit Network, Inc.’s cyber range to conduct product reviews for SC Magazine Pontiac, MI – Security Vitals has been awarded a new contract with Haymarket Media, publisher of SC Magazine. After an extensive search and review process, Haymarket Media selected Security Vitals as the firm to conduct SC Magazine...
Read More

Security and Compliance Part 1: Related but Not the Same

Welcome to part 1 of our 3 part series which dives into complicated relationship between security and compliance. There are many misconceptions about information security’s relation to compliance. Compliance does not equal a sophisticated information security system, nor does having a sophisticated security posture mean you are 100% compliant with a regulation or industry standard...
Read More

Intel Vulnerability: Are You Vulnerable to Attack?

Last month, a Wi-Fi vulnerability called the KRACK Attack was brought to the surface that potentially affects billions of devices. Now this month, Intel announced a security alert for their processor platforms that could possibly affect millions of devices. How bad is it? Intel’s Management firmware on many recent PC, server, and Internet-of-Things are vulnerable...
Read More

KRACK Attack: the Global W-Fi Vulnerability No One Wanted

Last month in October, security researchers announced perhaps one of the biggest vulnerabilities discovered in the past decade.  Say hello to the KRACK vulnerability, which is the clever acronym for what’s known as the Key Reinstallation Attack. KRACK likely affects billions of home and enterprise Wi-Fi devices around the world and is all because of...
Read More

U.S. Department of Defense letter confirms year end NIST 800-171 compliance deadline

    A letter regarding the NIST 800-171 compliance deadline from the Director, Defense Pricing/Defense Procurement and Acquisition Policy, in collaboration with the DoD Chief Information Officer and the Deputy Assistant Secretary of Defense, Systems Engineering, has developed the enclosed guidance for acquisition personnel in anticipation of this December 31, 2017 implementation deadline.  
Read More