Services

Services

CYBER SECURITY NIST 800-171 Compliance Cyber Security Consulting SIEM and Log Management Vulnerability and Risk Assessments Security Control Implementation and…

Read more

Portfolio

Portfolio

AEROSPACE MANUFACTURING NIST 800 - 171 SERIES TECHNOLOGY COMPLIANCE Manufacturing Compliance We will recommend and integrate technology to meet cyber…

Read more

The Security Foundation

A supplier of cyber security consulting, information technology and information security services. Security Foundation is trusted in the industry to provide cyber intelligence and security capabilities to work for your business.  Security Foundation can provide Cyber, IT and IS services to those who may not want to perform in-house or need assistance keeping up with the state-of-the-art. We provide documented Risk Assessments, System Security Plans, Plan of Action and Milestones with periodic reviews as needed to meet your business compliance standard.  

 

Mature business man with focused gaze is pushing a virtual button to activate GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE onscreen. Business concept for corporate governance, laws and regulations.

Contact Us for Information

RSS McAfee Securing Tomorrow

  • What is disk cleanup and does it remove viruses? May 19, 2020
    What is Disk Cleanup and does it remove viruses? It happens. You’re in the middle of a computing task, and your screen blinks. The blue screen (Stop Error) is shown with the message that your PC ran into an error and needs to restart. These hiccups occur when your computer’s software, firmware, or drivers crash […]
    McAfee
  • My email has been hacked! What should I do next? May 19, 2020
    Signs Your Email Was Hacked With the advent of #Staysafe and #Shelterinplace, the increase of personal email com-munication has skyrocketed. This increase has allowed clever hackers to worm their way into installing viruses via attachments as well as other common techniques. You Know You’ve Been Hacked When… Your Contacts are Receiving Messages Not Sent By […]
    McAfee
  • How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner May 19, 2020
    Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will help you understand how ATP Rules work and how you can utilize them to prevent infections from prevalent malware families such as Emotet, LemonDuck and PowerMiner. Please read through the recommendation section to effectively utilize […]
    Ankit Goel
  • Protect Yourself Against Phishing Scams With These Security Tips May 19, 2020
    Phishing is one of the oldest cyberthreats in the book, and yet still one of the most effective. As people across the globe find themselves taking to the internet more than ever before, criminals see this as an opportunity to release phishing attacks on unsuspecting users. In fact, Security Boulevard found a 600% rise in phishing campaigns in the last month. So, […]
    Alan LeFort
  • The “Zero Day” Conundrum May 19, 2020
    In my last blog I talked about how we should define “zero day” and the many misuses which in my view muddy the waters, making it ever more difficult to address the actual problem. In case you missed that one you can read it here, or you can simply accept the premise that zero day […]
    Dave Messett