Securing Your Business Payments

As part of our ongoing commitment to helping clients become more secure and efficient, Paymerang is introducing a learning series highlighting best practices in the world of AP and finance.   For our first installment we are sharing a few tools and exercises leveraged internally at Paymerang to mitigate risk.     According to the 2020…

Read More

Mitigating the Greatest Software Development Security Risk: Human Fallibility

Most application security failures are the result of people. Consequently, technology professionals understand that they should rotate access credentials/keys. Programmers know that SQL injection is bad, just as network engineers understand that opening SSH or RDP to the internet is dangerous. You probably know that you should not email financial information to the individual claiming…

Read More

How to Build a Threat Hunter Mentality

One Hundred and Ninety-Seven. That’s the average number of days an advanced persistent threat, known as an APT, can dwell without being detected inside a network—according to the 2018 Cost of a Data Breach Study conducted by the Ponemon Institute. That is a six-month period in which a very quiet threat, using sophisticated tactics, is actively exploring the network and most likely offloading sensitive data before it’s noticed, not even counting the days, weeks, months needed to then respond and recover from its foothold.  Data breaches can cause devastating financial…

Read More