Aaron is a security analyst with over 9 years of Information Security experience. His experience began serving in the US Military where he served in roles such as network and system administration, as well as teaching IT school for junior sailors. Aaron now serves as a senior security analyst for a shared services company supporting the healthcare industry.
As an IT Instructor for the military, Aaron delivered network administration, systems administration, and security training. He also assisted in the development of systems administration courses and lab development.
In his current position, Aaron publishes quarterly newsletters to users and clients. These newsletters address current trends in technology as well as security best practices. On certain occasions, such as WannaCry, Aaron has published special newsletters to address the severity and to ensure clients aware of the concern.
It is commonly known throughout the security community that users are the “weakest link in the chain” when it comes to a company’s network. This reason is why so many attackers first gain a foothold in a network through phishing attacks. There are different types of phishing that threaten a company’s network: phishing, spear-phishing, and whal...Read More
There are many different methods for performing a penetration test, which evaluates the security posture of a company, but in this article, we are going to focus on one: social engineering. Social engineering penetration testing focuses on people and processes and the vulnerabilities associated with them. These pen tests typically consist of an ethica...Read More
Privilege escalation attacks exploit weaknesses and vulnerabilities with the goal of elevating access to a network, applications, and mission-critical systems. There are two types of privilege escalation attacks including vertical and horizontal. Vertical attacks are when an attacker gains access to an account with the intent to perform actions as that user....Read More
In a world with ever-evolving technology comes ever-evolving threats and performing vulnerability scans and assessments are one of the best ways to protect the networks businesses rely on to operate. An internal vulnerability scan is performed typically with access to the internal network, with the main benefit of identifying at-risk systems while pro...Read More