Posts

When Was Your Last Pen Test?

If your response was, “What the heck is a Pen Test?” – your network is probably already harboring dangerous malware.

A penetration test, also known as a pen test, is an authorized simulated attack on a computer system performed to evaluate the security of the system.

The test is performed to identify weaknesses – including the potential for unauthorized parties to gain access to the system’s features and data – as well as strengths, enabling a full risk assessment to be completed.

The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain the goal.

A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.

It’s always best to arrange testing with a neutral third-party who IS NOT responsible for the management and support of your network.

TCI offers comprehensive penetration testing and we recommend getting yours at least once a year. To schedule your pen test, contact TCI today at (703) 321-3030 or info@tcicomm.com.

6 Easy Steps to Prevent Phone Hacking

Phone hacking, also known as “phreaking” costs businesses billions of dollars every year.

Decades ago, hackers accessed the public telephone network using a series of tones input via a “blue box” to fool Ma Bell into allowing them to make free long distance calls.  Now hackers can access phone systems through voicemail ports to make free international calls.

The good news is that there are simple measures you can take to ensure your phone system stays well protected.

  • When installing new equipment, always change the access credentials from the default settings.
  • Never use easy passwords such as 1234.
  • Routinely review itemized telephone invoices for any anomalies.
  • Ask your service provider about their fraud monitoring policy.
  • If you have more than one administrator accessing the telephone system, make sure they use unique access credentials.
  • Whenever staff members leave the organization, immediately disable their access credentials.

Your phone and IT systems are essential to your daily operations. Set up time with TCI to talk about implementing best-practice security measures for your business.

Ready to learn more?  Contact us today at (703) 321-3030 or info@tcicomm.com.