Contextual Security Solutions Blog
INFORMATION EVOLVES
SECURITY & COMPLIANCE BLOG
Why Credit Card Fraud Still Exists
If you have ever been the victim of credit card fraud, you know that sinking feeling in your stomach when you receive a call stating that your credit card has been compromised. Immediately questions begin swirling around in your head. “Where did I last use my credit...
The Average Cost of Data Breach
We have all heard of data breaches at one time or another but if you run a business, are you aware of exactly what this could mean for your company? It’s no secret that there are multiple costs associated with a data compromise, but many people aren’t aware of what...
Facemasks, Hand Sanitizer, Credit Cards: Beware of New E-Commerce Fraud
As the coronavirus continues to ravage the country, more and more Americans have turned to the internet for their shopping needs. In an effort to mitigate their exposure to the virus, they have unknowingly become victims of an entirely different malady: e-commerce...
Ransomware: What tha’, How tha’ & Logical Next Steps
BY Richard G., CO-FOUNDER @ CONTEXTUAL SECURITY SOLUTIONS Perhaps you have received a malicious unsolicited email, or you are experiencing annoying pop-ups on your computer or network. If so, it’s possible that you have become the victim of ransomware. Ransomware is a...
Q3 Infosec Quarterly Quorum
We look forward to announcing the topic and date for the Q3 2020 Infosec Quarterly Quorum (IQ2) soon. As always the focus of our IQ2's is to present and discuss current events and trends in the realm of information security and compliance. The presentations are...
What’s in the Pen Test?
Is your organization required to have an Annual Penetration Test? Are you currently evaluating vendors or want to know more about the Contextual Security Solutions approach? If so, reach out to our team today for a copy of the "What's in the Pen Test" information...
Lessons in Web Conferencing Security – Zoom and Cisco Webex
If you are like me, by now you have experienced firsthand “death-by-virtual-meeting.” With the necessity of online conferencing for business life to continue, we are all well used to the awkward muting and unmuting, talking over each other, and the like. But what...
Should I Have Security Testing Performed
One of the questions our sales team is getting from current and prospective clients relates to whether or not testing should happen during work from home (WFH) and quarantine timeframes. The answer is yes, or no, maybe… If your income has ceased and does not look like...
Protecting Yourself from Online Scammers
COVID-19 is an issue that has been on many people’s minds during the past few weeks. Unfortunately, scammers and other malicious actors are using people’s fears and uncertainties to take advantage of this crisis. Because of this unfortunate reality, I want to...
Remote Access to the Workplace
Several companies have shifted their workforce from an environment they believe they control to an environment they definitely do NOT control; the employee’s home. There is still A LOT of misunderstanding between traditional IT infrastructure personnel and the...