Call Us: 1-866-802-9405
Providing you with the latest information on

Security Insights

Intel Vulnerability: Are You Vulnerable to Attack?

Last month, a Wi-Fi vulnerability called the KRACK Attack was brought to the surface that potentially affects billions of devices. Now this month, Intel announced a security alert for their processor platforms that could possibly affect millions of devices. How bad is it? Intel’s Management firmware on many recent PC, server, and Internet-of-Things are vulnerable...
Read More

KRACK Attack: the Global W-Fi Vulnerability No One Wanted

Last month in October, security researchers announced perhaps one of the biggest vulnerabilities discovered in the past decade.  Say hello to the KRACK vulnerability, which is the clever acronym for what’s known as the Key Reinstallation Attack. KRACK likely affects billions of home and enterprise Wi-Fi devices around the world and is all because of...
Read More

U.S. Department of Defense letter confirms year end NIST 800-171 compliance deadline

    A letter regarding the NIST 800-171 compliance deadline from the Director, Defense Pricing/Defense Procurement and Acquisition Policy, in collaboration with the DoD Chief Information Officer and the Deputy Assistant Secretary of Defense, Systems Engineering, has developed the enclosed guidance for acquisition personnel in anticipation of this December 31, 2017 implementation deadline.  
Read More

Compliance vs. Information Security

There is some confusion in the information technology industry at times between compliance and information security. Being compliant with a certain set of standard controls such as PCI DSS, HIPPA, or NIST 800-171, is completely different than having an effective information security posture. Compliance does not equal security, and in turn, security does not equal...
Read More

Don’t Overlook the Simple Solutions

Building an information security program in a business can be a daunting task. It can easily become over complicated and out of control. A lot of companies starting from scratch usually do not have an expert in the security field on staff. This can also lead to an increased amount of time to put this...
Read More

Macomb-OU Incubator Invests in Pontiac Tech Company Security Vitals with Business Accelerator Fund Award

Pontiac, MI – Security Vitals is one of the newest clients of the Macomb OU-Incubator as a recent award recipient of a grant from the Business Accelerator Fund (BAF). BAF awards are an initiative of the State of Michigan’s 21st Century Jobs Fund Program and are distributed by the Michigan Small Business Development Center through...
Read More

Understanding the Value of Awareness and Ongoing Training

Train your employees One of the best defenses against information breaches to a company is its employees, and they may not even know it. Some common breaches that have occurred in companies have been linked to opening an email or not following proper security procedures.  In these cases, the best and most cost-effective way to...
Read More

Cyber Security is an Ongoing Process

Companies targeted by cyber-criminals Whether your company is a big or small enterprise, there is a good chance that it could be a target for hackers and cyber-criminals. An important operating item many enterprise companies do not budget into their annual costs, and most notably spend time on is cyber security. This is usually due...
Read More

Are Your Government Contracts At Risk?

Time is Ticking to Achieve NIST 800-171 Compliance   Your team is invited to attend our upcoming event discussing the 7 Key Steps to Help You Achieve NIST 800-171 Compliance. This presentation provides insights and details on how to effectively meet the compliance requirements before the fast-approaching Dec. 31, 2017 deadline. Attendees will gain an...
Read More

Avoiding Risk is Not Devoiding Risk: October is Cyber Security Awareness Month

Security Vitals Shares Expertise in Mitigating Security Weakness Pontiac, MI – One of the largest threats and persistent risks to small and medium-sized businesses is the potential for a security breach. Hacks, scams, and phishing requests come in every size and shape, and are exponentially getting worse as nefarious individuals, organizations, and companies, both locally...
Read More

Dangers and Benefits of Cloud Storage

Security and Cloud Storage Recent news stories about cloud computing solutions have highlighted its role data leaks. Organizations that have suffered from leaks range from the Republican National Committee to Verizon, and more recently Dow Jones Publications (the parent company of The Wall Street Journal). Events like these cause some to question the security of...
Read More

Technology Companies Catalyze Pontiac’s Comeback

Technology Companies Catalyze Pontiac’s Comeback Pontiac, MI – Tech companies are betting on Pontiac as the next hot spot in Metro Detroit to support the ever-growing tech landscape. Pontiac real estate is taking off as these high-tech companies are creating traffic, boosting the economy, and bringing attention to the city. The influx of these companies...
Read More