Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

+1 -800-456-478-23

Healthcare Cybersecurity
Breached Healthcare Records Surpass U.S. Population

Breached Healthcare Records Surpass U.S. Population

Healthcare breaches have recently reached a grim milestone. As of June 10th, 2022, the number of Protected Health Information (PHI) records breached has reached 341,995,928.  To put in prospective, this number surpasses the United States population which is at 332,759,097 (United States Census Bureau, 2022).  It must be noted that these numbers only include reported healthcare […]

Cybersecurity
Velocity Goes Freemium

Velocity Goes Freemium

Background Our company mission is to “Secure the Planet”.  This means that we aim to provide education and solutions that any company in the world can use to reduce cyber risk.  Our flagship product, Velocity, is a web application (SaaS product) which companies can use to evaluate their own cybersecurity posture as well as to […]

Cybersecurity
Authenticated vs Unauthenticated Vulnerability Scanning

Authenticated vs Unauthenticated Vulnerability Scanning

Introduction Not all vulnerability scans are created equal. The configuration of a vulnerability scan makes an enormous impact on your results. Authenticated vulnerability scans will provide much greater insight into an organization’s security posture than unauthenticated scans. What are Vulnerability Scans? Vulnerability scans are an automated process for searching devices for vulnerabilities. Vulnerability scanners are […]

Cybersecurity
CMMC 2.0 Program Update

CMMC 2.0 Program Update

On November 4, 2021, to safeguard sensitive national security information, the Department of Defense (DoD) launched Cybersecurity Maturity Model Certification (CMMC) 2.0, a comprehensive framework to protect the defense industrial base (DIB) from increasingly frequent and complex cyberattacks. With its streamlined requirements, CMMC 2.0 was created to:• Cut red tape for small and medium sized […]

Cybersecurity

Where Should the CISO Report?

The CISO (Chief Information Security Officer) reporting structure is a hotly debated topic and the solution often differs depending on the organization. This question has perplexed many organizations. It’s a topic of growing importance as cyber attacks grow in frequency and breach costs increase. Many organizations initially place the cybersecurity responsibility within the IT department […]

Healthcare Cybersecurity Vendor Risk

Vendor Breach Threat – A Need for Vendor Risk Evaluation

If the SolarWinds hack taught us anything, it’s that the security of a company’s infrastructure is dependent on the resilience of their vendors. A breached vendor is a trojan horse that bypasses normal defenses and accesses the trusted areas of the network. Threat actors have cunningly discovered that a trusted vendor is often the easier […]

Cybersecurity Research Tools Penetration Testing
A password auditing tool by Stern Security

Introducing PassTheStats – A Password Auditing Tool

Weak passwords are often the cause of data breaches. Love or hate them, everyone is using passwords today. Ensuring individuals are using strong passwords in important to securing an organization. Whether you’re performing a penetration test or a password audit, tools can help you add value and efficiency for your report. At Stern Security, we […]

  • 1
  • 2