Our Blog

Guide to Conducting IT Risk Assessments
Many businesses hire independent firms such as ERMProtect to conduct IT risk assessments and draft remediation and response plans, especially if they are rich targets for hackers. Other businesses perform

How Artificial Intelligence Will Drive the Future of Penetration Testing in IT Security
Over time, the penetration testing practice and servicing has evolved from being a completely manual and tedious process that only a few people knew how to do to a more

What are Penetration Tests and Why Do You Need Them To Maintain IT Security?
Penetration tests involve performing highly technical tests and simulated attacks to identify the various pathways hackers or insiders could use to penetrate an organization’s cyber defenses.

Use This Windows Feature To Help Track a Hackers’ Moves During a Data Breach
If you need help with a data breach, our incident response team stands ready to help utilizing techniques and methodologies developed in our 24 years in business as a cybersecurity

Using Digital Forensics to Investigate Insider Threats in the Remote Workforce
Investigating insider data breaches with digital forensic investigators. In today’s hectic and remote-working world, monitoring and responding to insider threats in a timely and effective manner is extremely critical.

Lessons to Learn from the Industrial Grade Hack At Oldsmar, Florida
The City of Oldsmar, Florida, was hit by a hacker attack. The city’s water treatment plant was targeted and the hacker increased the level of sodium hydroxide (also known as