{"id":6,"date":"2017-02-06T18:17:58","date_gmt":"2017-02-06T18:17:58","guid":{"rendered":"http:\/\/www.patchadvisor.com\/blog\/?p=6"},"modified":"2017-03-01T19:32:46","modified_gmt":"2017-03-01T19:32:46","slug":"patchadvisor-welcomes-you-to-our-blog","status":"publish","type":"post","link":"http:\/\/www.patchadvisor.com\/blog\/?p=6","title":{"rendered":"PatchAdvisor Welcomes you to Our Blog!"},"content":{"rendered":"<p><strong>2017 Will be a Focus Year for Security &amp; Risk Assessment<\/strong><\/p>\n<p>In 2017, we start the year with much controversy in the security industry, particularly questions surrounding international hacking of our federal systems in the US, as well as private, large scale intrusions into medical records, bank accounts, and many other personal identifiable information breaches.\u00a0 This is clearly a year where security and risk assessment will be in focus for all industries across the globe. At PatchAdvisor (PA), founded in 2003, we stand ready to support the equation for security measures and testing across the board.<\/p>\n<p>Here are some of the landscape facts for a quick view:<\/p>\n<p>This past year&#8217;s IBM study found the average consolidated total cost of a data breach grew from <strong>$3.8 million<\/strong> to <strong>$4 million<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.techrepublic.com\/article\/49-of-businesses-fell-victim-to-cyber-ransom-attacks-in-2016\/\">TechRepublic<\/a> reports that \u201cdata loss\u201d topped the list of IT professionals&#8217; cyber attack concerns, with 27% of tech leaders reporting this as their greatest worry. It was followed by service outage (19%), reputation loss (16%), and customer or partner loss (9%).<\/p>\n<p><a href=\"http:\/\/www.computerworlduk.com\/iot\/enterprises-divided-on-iot-skills-gap-says-451-research-report-3652394\/\">ComputerWorld UK<\/a> cites that enterprises are embracing the internet of things &#8212; with 71% gathering data from IoT.\u00a0 451 Research reported in this article that many corporations now turn to public clouds for storage needs, however this data is also showing an IoT skills gap in data analytics and security.<\/p>\n<p><a href=\"http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-threats-predictions-2017.pdf\">McAfee Labs reports<\/a> in their annual threat predictions that \u201chardware and firmware threats are an increasing target for sophisticated attackers.\u201d The 2016 wrapup reiterates, \u201cHardware vulnerabilities can undermine the operation and security of the entire software stack. Exploiting a hardware vulnerability can compromise an entire system and does not require an exploit of the software stack.\u201d<\/p>\n<p>PatchAdvisor will guide you in this blog with key insights, best practice counsel, how-to tips, and a view of the landscape in large-scale network security, offering new points of view and reminders that will make your systems safer.\u00a0 PA\u2019s reach continues to expand in the Washington federal corridor and worldwide with growth corporations and multi-nationals redefining what \u201csafe and secure\u201d really means.\u00a0 We invite you to visit this blog, to learn from our team of thought leaders and experts, and to engage us in discussion about the most critical topic of our times&#8211;network security.<\/p>\n<p>Our team has made more than 80 presentations since our inception, and we look to continue to impart security know-how as it evolves.<\/p>\n<p>For 2017, we highly recommend the four following steps be taken by all types of businesses, and government agencies:<\/p>\n<ol>\n<li><strong>Be proactive and order a system-wide vulnerability assessment and key levels of penetration testing.<\/strong>\u00a0 Vulnerabilities to be checked include:\u00a0 primary internal and external networks, hosts, applications and wireless networks.<\/li>\n<li><strong>Review your network design, knowing your scalability and needs for growth this year.<\/strong> Examine your identity management, your security architecture, firewalls, and requirements for external and internal users within network parameters.<\/li>\n<li><strong>Schedule source code review of internally-developed software. <\/strong>We understand that testing and measurement of levels of security is essential to deployment.<\/li>\n<li><strong>Realize that automated analysis, while useful, is only the first step to a bottom-line efficient and robust, customized plan for security detection to avoid exploitation.<\/strong><\/li>\n<\/ol>\n<p>If the worst has already happened, PatchAdvisor can assist in the analysis and re-design of your security infrastructure.\u00a0 We are not tied to particular vendors and are product agnostic.\u00a0 We are professionals that devise the best plans for your specific needs.<\/p>\n<p>Engage PA in 2017 to protect your organization\u2019s assets. Optimize security without sacrificing operational efficiencies.<\/p>\n<p>PatchAdvisor engagements run the gamut in size and scope of work.\u00a0 Here are two examples:<\/p>\n<p><strong>Example A:<\/strong>\u00a0 Assessment of a dual-DMZ Internet-based electronic commerce application network, and its servers and firewalls.<\/p>\n<p><strong>Example B:<\/strong> A complete assessment of a worldwide multi-billion dollar corporation with over 60,000 live IP addresses.\u00a0 This latter organization had a mixed TCP\/IP, IPX, and SNA network including administrative networks, design systems, manufacturing floor networks, field office networks and manufacturing networks in cities around the world.<\/p>\n<p>All questions are important and our team leads welcome them in this forum.\u00a0 Please send specific consulting interest or PA business questions directly to:\u00a0 Trey Wadsworth, PatchAdvisor\u2019s Vice President of Business Development, trey[at]patchadvisor[dot]com.<\/p>\n<p>Jeff Larocca, CEO<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2017 Will be a Focus Year for Security &amp; Risk Assessment In 2017, we start the year with much controversy in the security industry, particularly questions surrounding international hacking of our federal systems in the US, as well as private, large scale intrusions into medical records, bank accounts, and many other personal identifiable information breaches.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":19,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,4],"tags":[8,10,6,9,12,11,7],"_links":{"self":[{"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/6"}],"collection":[{"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6"}],"version-history":[{"count":3,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/6\/revisions"}],"predecessor-version":[{"id":24,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/6\/revisions\/24"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=\/wp\/v2\/media\/19"}],"wp:attachment":[{"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.patchadvisor.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}