Penetration Testing


Cyber Security’s Weakest Link is Human Beings

  The Weak Link In Security Often times when a company looks into becoming more secure, they typically look to add devices, software or settings in place to help defend their network. It’s hard to convince them that the weak links in there network is the employees on them. Convincing […]


Phishing attacks that take advantage of tragedy – Cyber Protection Group

  The new scam on the streets The Federal Trade Commission has issued an alert on a scam that is using the recent floods in Louisiana to its advantage. These scams take the form of a charity that ask readers to donate money to them. They of course keep this […]


Why did I get a Virus even when I have Antivirus?

The Truth About Antivirus Many users misunderstand the purpose of using antivirus and firewalls. Users believe that they are safe just because they pay a monthly subscription to Norton antivirus. The reality is that no antivirus or firewall will keep you safe from the threats out there. It is nice to think […]


Why are DDOS attacks hard to defend against?

For a company one of the most terrifying things to deal with is having down time. Your network being down means you can’t make sales or continue normal operations. One attack hackers use in particular takes advantage of this fear. This attack is known as Distributed Denial of Service or […]


Exodus Intelligence Security Firm offers up to $500,000-dollar bounty for security exploits

One way companies are now attempting to discover vulnerabilities in their software or products, is to offer a bounty for any exploits that are found in their software by any third party’s. This is a good way for companies to motivate the public to actively search out exploits. These exploits […]


Cyber Protection Group to offer $2,000 Security Assessment for Second Year in a Row

For the second year in a row, Cyber Protection Group is offering external vulnerability security assessments for only $2,000.  The increased number of security breaches that have occurred in 2015 have caused a continued need for companies to protect their data.  Vulnerability assessments such as web application testing, internal and […]