Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.

Haidon Storro

Haidon Storro
Cybersecurity Research & Content Manager, Silent Sector -- Haidon Storro is a Cyber Security Analyst for CVS Health. She has her BS in IT Cyber Security as well as security certifications like CompTIA Security+ and ISC2. While Haidon is newer to the security community, she has dedicated herself to learning as much as she can through internships, online courses, and conventions like DefCon. In her free time, she enjoys reading about new advancements in technology, going to security meetups and participating in cyber defense competitions. One of Haidon’s goals is to make the connected world safer by bridging the human aspect with technology.

Recent Posts

0 Comments

The Double-Edge Sword of Social Media

Last week the FBI’s charlotte office warned social media users to pay close attention to the information they share online and “carefully consider the possible negative impact of sharing too much personal information online.” This alert comes at a time when many people are confined to their homes and consequently taken up social media to pass time during the period of social isolation.

Read More
0 Comments

NIST 8170 Provides an Excellent Approach to Cyber Security Frameworks

In a market where security and IT vendors are heavily saturated it is increasingly becoming difficult to determine which vendors truly have sound security solutions. Moreover, from the vendor perspective, how can they distinguish themselves from their competition? One approach both parties can take is following the risk based approach to cybersecurity recommended by the National Institute of Standards and Technology Cybersecurity Framework (NIST) 8170.

Read More
0 Comments

Android Security Risks for Small to Medium Sized Businesses

In yet another crackdown on the Google Play Store, Google has removed hundreds of phony and terms of service breaking applications (apps). The Play Store is the official app store for the Android Operating System (OS). In a survey conducted by software company Lefttronic, it is estimated that Android is the most dominant OS with 76% of the market share. Moreover, Lefttronic’s forecast suggests this number will only jump to 87% by 2022. This means every business currently has or will have at least one Android user and with many small and medium sized businesses (SMBs) permitting Bring Your Own Devices (BYOD), employees utilizing Android OS pose a major security risk.

Read More
0 Comments

A new version of an old DDoS weapon and how Russia could take down the Internet

The internet has become increasingly critical for survival during the COVID-19 pandemic and is a necessity with millions of people working remotely. A recent discovery by Digital Revolution, a Russian hacker group, reveals that Russia’s national intelligence service (FSB or Russia’s Federated Security Service) has been working on an Internet of Things (IoT) botnet project that could shut down the internet.

Read More
0 Comments

What is a Pen Test and why do you need it?

A Penetration Test (Pen Test) is a simulated cyber-attack against an organization to identify exploitable weaknesses. The purpose of the simulated attack is to uncover any weak spots on a network, application or endpoint that a threat actor could take advantage of and address them accordingly before an attacker can exploit them. Pen testing is becoming more critical as all companies have a network presence and thus, are susceptible to attackers. Moreover, a successful cyber-attack has major consequences that can be detrimental to the livelihood of an organization.  

Read More
0 Comments

YOUR ORGANIZATION SHOULD CONSIDER THE ADVANTAGES OF NIST SP COMPLIANCE

Most companies are looking for ways to set themselves apart from their competition. One way they can stand apart is by proving their operational security maturity and adopting the National Institute of Standards and Technology Special Publication (NIST SP) framework 800-53. NIST is a non-regulatory agency of the U.S. Commerce Department that establishes standards across federal agencies. NIST SP 800-53 is a set of standards to assist federal agencies in meeting the requirements set by the Federal Information Security Management Act (FISMA). However, given the latest cyber security headlines, NIST 800-53 is starting to influence the private sector as well.Contact Us

Read More
0 Comments

Should Your Company Have a SOC 2 Audit?

The business profiles and mitigation priorities of service companies today are incredibly diverse. Furthermore, with breaches occurring left and right customers are increasingly expecting proof that their data is being properly secured. One way companies can meet this expectation is by attaining Service Organizational Control (SOC) 2 compliance. SOC 2 compliance was designed to validate that service providers are handling customer data in a confidential manner and with the utmost care. Ultimately, this provides organizations that seek to become SOC 2 compliant with a competitive advantage against industry competitors.

Read More
0 Comments

Cybersecurity in the Pandemic Panic - Remote Personnel Management & Collaboration

Remote work is becoming a new experience for many due to the current events that can be difficult for employers and employees to grasp. As more companies roll out mandatory remote work from home (WFH) in response to COVID-19, organizations need to consider what the new home office procedures are and the communication plan for remote personnel.

Read More
0 Comments

Cybersecurity in the Pandemic Panic - The Age of The Remote Workforce

The rise in employees forced to work from home (WFH) due to the COVID-19 outbreak has led to a major spike in companies realizing they are not prepared for the new onslaught of remote workers. There is no telling how long this period could last, and subsequently, businesses are starting to evaluate how they will securely facilitate long term access for their remote workers.

Read More
0 Comments

Cybersecurity in the Pandemic Panic - Patching Problems and Solutions

Vulnerability scanning and patching is a cornerstone of cybersecurity. Deploying relevant patches is a critical step in basic security measures to minimize any organization's endpoint vulnerabilities. In response to COVID-19, many companies are now required to have employees work from home (WFH). This sudden transition to a remote workforce has resulted in essential security practices and assessments like patching, to become either delayed, neglected or forgotten. As such, we can expect attackers to take advantage of this and use vulnerable devices to infiltrate an organization. 

Read More