Image
formats

TRUST | At ProactiveRISK we are dedicated to supporting your mission – with the utmost integrity, professionalism, and discretion. Whether you’re an enterprise seeking a second opinion or a startup seeking to scale rapidly – our services and solutions will bring you confidence and peace of mind.  Trust is the core of all our client relationships and why we come highly recommended.

pptOBJECTIVITY | Every client’s circumstances are unique – and that’s why our people listen very, very carefully to you. Our recommendations will be tailored to the facts of your particular situation. In order to avoid conflicts of interest in product sales, we refuse any commissions or other compensation from client transactions based on our recommendations.

COMPETENCE | With our teams combined years of expertise including software development, penetration testing and investigations we bring the A-Team each and every time to your unique situation. 

Schedule your proactive one-on-one discussion today.


Software Assurance | Application Security | Asset Management | Vulnerability Management | Patch Management | Configuration Management | Incident Coordination | Supply Chain Risk Management | Cyber Intelligence Threat Analysis | Cyber Threat Information Sharing | Malware Protection | Intrusion Detection | System Assessment | Enterprise Reporting | Remediation

Anti-Ransomware Guide

Are you getting ready for summer? Planning that long weekend with friends and family poolside with a BBQ of your favorite dish? Have you been proactive about current threats that face your business DAILY? Written by: Christopher M. Frenz & Christian Diaz Open up any newspaper or news site and an increasingly common headline is becoming “hospital held for ransom”.  While hospitals and other organizations often have downtime procedures that let them revert back to paper for dealing with power outages and other disasters, it is still a nightmare scenario to find your entire organization’s IT infrastructure screeching to a

Read More…

State Data Breach Disclosure Laws

Failure to plan is planning to #FAIL and why we created the Incident Response Top 10 Guidance FAQ on this project is state breach laws so here is a quick reference. States with no security breach law: Alabama, New Mexico, and South Dakota. State Citation Alaska Alaska Stat. § 45.48.010 et seq. Arizona Ariz. Rev. Stat. § 44-7501 Arkansas Ark. Code § 4-110-101 et seq. California Cal. Civ. Code §§ 1798.29, 1798.80 et seq. Colorado Colo. Rev. Stat. § 6-1-716 Connecticut Conn. Gen Stat. § 36a-701b, 2015 S.B. 949, Public Act 15-142 Delaware Del. Code tit. 6, § 12B-101 et seq. Florida Fla. Stat. §§

Read More…

2016 Verizon Data Breach Investigations Report

Let’s Get Back to the Basics Folks By: Tom Brennan  @brennantom I recently completed my review of the 2016 Data Breach Investigations Report that speaks to 100,000+ incidents, including 2,260 analyzed breaches. 82 countries.  My takeaways are as follows: 1. Remain Vigilant Recently 1.5 million customers of Verizon Enterprise were for sale. Some would say this is ironic, but what it means to me is that everyone is HUMAN. SEC_RITY requires “U” to be vigilant in all aspects of its operations from creation, deployment and use of technology.  I was very happy to see the work of the Center of Internet

Read More…

10 Hidden IT Risks

Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it’s probably impossible to imagine your business without IT. Today, computing technology plays a vital role in the way you serve, work with, and communicate to your clients. Thanks to advances that have made technology more powerful yet less expensive, even
the smallest practice can enjoy capabilities – in everything from marketing and sales to delivery and fulfillment – that were once the sole domain of large enterprises. But today’s big IT advantages come with major risks. Your networks

Read More…