Critical Security Information For Security Conscious Companies

Email Us - 877.583.2841 - Request A Demo

Use This Form To Have A TruShield Team Member Contact You With More Information.

  • This field is for validation purposes and should be left unchanged.

Use This Form To Contact TruShield Inc Directly. Or you can call us at: 877.583.2841. We will respond back as quickly as possible!

  • This field is for validation purposes and should be left unchanged.

The Developing Dangers of SCADA Systems

Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities in America, as well as in other countries. These devices are a part of the nation’s critical infrastructure and should be protected from the growing and evolving list of security threats that exist today. SCADA devices are useful in that they collect and analyze data and control equipment from remote locations. However, they also present a security risk. Currently, there are 61 commercially operating nuclear power plants in the US and 99 nuclear reactors in 30 states (EIA, 2016).  Increased number of nuclear power plants and reactors dramatically increases the risks associated with the facilities, more so if the network is unsecured properly and in the event of a cyberattack.

Continue Reading

The Vulnerabilities of the President’s Twitter

By now, you have probably heard about how our fearless commander-in-chief is utilizing an outdated Android device, and maybe it makes you wonder if he has already been hacked.  Along the same lines, you might think his Twitter account is already potentially compromised (did you catch his thoughts on the whole Russia hacking topic?).  Here to speak… Continue Reading

Best Approaches and Solutions for Endpoint Detection and Response

From our guest contributor, Corey Lancaster Sr. Cybersecurity Solutions Architect Basic Upkeep and Awareness The best approach and solution for Endpoint Detection and Response is to prevent it from happening in the first place. Prevention can be broken down into a few identifiable categories. Often, IT leaders and Senior Management focus on the “block and… Continue Reading

The SEC’s Ultimatum on Cybersecurity

On January 12, 2017, the Securities and Exchange commission released their Office of Compliance and Inspections Examination (OCIE) priorities for the year.  Indicative of the increasing risks that are present in a highly-connected environment, cybersecurity continues to be a top focus for the SEC when examining its registrants.  Specifically, the OCIE stated that they “will… Continue Reading

Top FAQs on PCI Compliance

  What is PCI DSS and how to find resources about it? “The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that all companies that process, store or transmit credit card information maintain a secure environment.” Continue Reading

Lip Kits = Loss of Security

If you happen to be a make-up connoisseur and an IT specialist then you have probably heard about the security breach that happened to a very famous reality TV star. Kylie Jenner has recently popped up again due to her new makeup line, Kylie Cosmetics. Kylie released her line of lip kits which retail at… Continue Reading

Upcoming Webinar: Building a Security Program, Part 4 – Control Freak – Implementing Security Controls

An essential component for ensuring security involves network segmentation and configuration. Without the proper configuration of your system, you open your network up, both internally and externally, to cyber threats. In this webinar “Building a Security Program, Part 4 – Control Freak – Implementing Security Controls”,  experts will discuss the best practices for setting up your… Continue Reading

Black Hats. White Hats. Gray Hats.

No, we aren’t talking about men’s fashion items. Instead we are talking about the different ways that hackers are identified. It couldn’t be simple, we had to categorize them in order to tell the ‘good’ from the ‘bad’ and of course the in-between. Continue Reading

Copyright © 2016