Bulletproof Office Helping You to Better Enable Your IT

By: Steve | July 16, 2014

Don't forget to run Vulnerability Scans


A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for security weaknesses.


There are various types of vulnerability scanners available today, distinguished from one another by a focus on particular targets. While functionality varies between different types of scanners, they share a common, core purpose of identifying and enumerating the vulnerabilities present in one or more targets.  

Network Guard Dog

Vulnerability scanners are a core technology component of vulnerability management. 


Scans should be done at least once per year and, please keep in mind, they do create a lot of information to review, so plan accordingly.  You also o...

By: Steve | June 04, 2014

Time to do a review of  your environment and perform a bit of "security housekeeping."

  • Reset all default passwords, including networked peripherals that are often left with a default password like "admin."
  • Remove all unnecessary applications.
  • Close all unnecessary network communication ports.
  • Delete any accounts that are no longer used. 
  • Review any other methods you may have in your environment to further secure all network-attached devices - don't forget about things like IP security cameras or other specialized equipment like diagnostic devices in healthcare.  If it is connected to your network, there is a conceivable way that a cyber-thief can hack their way in and find their way to your data.  
This well done a...