top of page
SecuSolutions Blog


Don’t Develop Tunnel Vision
Talking to companies about security is what we do, and we’ve been doing it for nearly 25 years. Over the years we have had some interesting engagements with some very prominent companies. Many of the companies we have serviced have had very comprehensive security programs in place and have utilized the latest in security technologies. Some follow security standards like NIST, ISO and SOC. These companies, by security standards, are doing the right thing. So why are so many st
jimkootnekoff
2 min read


The Top 5 Reasons to Conduct a Penetration Test
Throughout the years, we have conducted hundreds of penetration tests on companies across the globe. The tests we have performed have included large enterprises to small and medium sized businesses (SMB) and have taken place in practically every industry you can think of. The reasons these companies requested a penetration test are endless, but we have compiled the top 5 reasons we see for you here! In no order. ### Reacting to a Breach or Ransomware Attack For many companie
jimkootnekoff
4 min read


When is the right time to conduct a penetration test?
For decades we have been providing penetration testing services for companies across the globe. From small businesses to large enterprise organization and those between, we’ve served them all. Many of the companies we serve receive penetration tests annually, in some cases even twice a year, while others are receiving one for the first time. ### Companies having Penetration Tests Often The companies that receive frequent penetration testing already have an idea of what they w
jimkootnekoff
5 min read


Size Doesn’t Matter to a Hacker, Part 2
This is part 2 of my last post “size doesn’t matter to a hacker”. Previously I pointed out why both large enterprise and SMBs are at risk of cyber-attack for different reasons, in today’s blog I will shed some light on what I believe both sizes can do to help reduce the probability of attack. ### Let’s start with enterprise. In a large organization communication breakdown is common. As mentioned in part 1, there are many reasons for this. A lack of good communication can have
jimkootnekoff
4 min read


Size Doesn’t Matter to a Hacker, Part 1
### Scenario #1 So, you work in a large or enterprise sized company in the IT team. You have an enormous budget and feel that you’ve got everything in place to keep you out of the hacker’s line of fire. You have all the big brand security solutions in place. You have a dedicated IT team that’s focused on security, and an entire team devoted to procedural security and compliance. You have 24/7/365 monitoring in place and are paying dearly for it. On paper, you’ve done everythi
jimkootnekoff
5 min read


You’ve got a limited security budget…now where should you spend it?
So, you’ve finally got budget approval for your security, the downside is it is less than you wanted. Where do you spend it? What can you do to minimize your company’s exposure to attack while at the same time conserving as much budget as possible? I’d like to offer practical and actionable advice. For over 24 years, my company has been providing security services to organizations around the globe. For that same amount of time, we’ve been giving the same advice to companies t
jimkootnekoff
3 min read


Is a Penetration Test Worth It? Ask a Hacker…
Penetration testing, or ethical hacking as it is sometime referred to, has been around since the 1960’s. In 1971 The US Air Force adopted penetration testing to evaluate the security of their time-shared computer systems. Then, in the 1980’s the US Navy began ethical hacking tests to determine how easily terrorists could access their naval bases. Soon after, the government started investigating illegal hacking incidents and the rest is history. Fast forward to today and ethic
jimkootnekoff
4 min read
bottom of page

