Security Recommendations

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Security Recommendations

  • HVAC system IoT Settings

    Securing the Internet of Things

    By Bonnie Smyre Any connected device is a potential vulnerability. Watch and find out how to secure your smart thermostat. July 24, 2020
  • Raxis CTO, Brian Tant

    Understanding the Why Behind Password Management

    By Bonnie Smyre In this video, Raxis CTO Brian Tant explains why password mismanagement is still one of the most reliable ways to breach a company network and what you can do to secure your network. July 10, 2020
  • Raxis CTO, Brian Tant

    What is Least Privilege Access?

    By Bonnie Smyre Raxis CTO Brian Tant explains least privilege access and why it is essential to corporate cybersecurity. June 26, 2020
  • Raxis CTO, Brian Tant

    3 Steps You Should Take Right Now to Reduce Your Risk of a Cyberattack

    By Brian Tant In this video, Raxis CTO Brian Tant talks about three steps you should take to secure your network against hackers. June 22, 2020
  • The following is a reenactment of a typical physical security assessment performed by a professional Raxis security engineer

    Here’s How Hackers Can Get Through Your Doors and Onto Your Network

    By Brian Tant Just a guy who left something at work and had to run back in? But that’s not my office, that’s not my badge, and, at sunset, my day is just getting started. June 12, 2020
  • Canned air attack

    Can This Simple Trick Outwit Your Smart Security?

    By Brad Herring Armed with nothing more than an ordinary can of cool, compressed air, a hacker can gain entry to a key-card-only access facility in just 19 seconds. Skeptical? See for yourself. June 5, 2020