Our Services

we help you maintain strong defenses against attacks

IT Security Assessments

IT Security Assessments and Penetration Tests are an important part of an effective cyber-security strategy because they provide the opportunity to discover and address weaknesses.  Consider: Vulnerability Assessments: Non-intrusive scans of your public facing infrastructure and/or internal servers to discover…
security and regulatory auditing for compliance


We don't confuse compliance with security and neither should you.  When we manage your regulatory requirements (e.g. PCI-DSS, HIPAA, OCIE, CIP,  NERC-CIP, etc.), you will find that our recommendations will often exceed minimum compliance guidelines. You outsource the work,  not…
we provide employee awareness training


Are your own employees your weakest link?  Are they on guard against Social Engineering exploits such as Phishing?  Do they recognize suspicious behavior and content?  Would they report it if they did?  Our cyber-security training is designed to transform your staff…

Follow Affinity IT Security

Second wave is no more dangerous than the first, IF you have taken the advised precautions.

DocuSign users beware ! Phishing underway using stolen email addresses. Downloaded doc contains malware. https://t.co/RuY01AOTbO

Fascinating + worrisome that it was a private researcher who stumbled on the kill-switch. Where was DHS on this ?


Another week in which you MUST update windows, as evidenced by the use of the scary technical term "crazy bad":

Attacks are up, demands are rising, and 64% of US firms pay up: https://t.co/QX2Hz7igIj. Also: interesting take on ransom of IoT devices.

Load More...