Posts by Jeff Gainer
Securing Your Business Payments
As part of our ongoing commitment to helping clients become more secure and efficient, Paymerang is introducing a learning series highlighting best practices in the world of AP and finance. For our first installment we are sharing a few tools and exercises leveraged internally at Paymerang to mitigate risk. According to the 2020…
Read MoreMitigating the Greatest Software Development Security Risk: Human Fallibility
Most application security failures are the result of people. Consequently, technology professionals understand that they should rotate access credentials/keys. Programmers know that SQL injection is bad, just as network engineers understand that opening SSH or RDP to the internet is dangerous. You probably know that you should not email financial information to the individual claiming…
Read MoreHow to Build a Threat Hunter Mentality
One Hundred and Ninety-Seven. That’s the average number of days an advanced persistent threat, known as an APT, can dwell without being detected inside a network—according to the 2018 Cost of a Data Breach Study conducted by the Ponemon Institute. That is a six-month period in which a very quiet threat, using sophisticated tactics, is actively exploring the network and most likely offloading sensitive data before it’s noticed, not even counting the days, weeks, months needed to then respond and recover from its foothold. Data breaches can cause devastating financial…
Read More