No testimonials please.
If you have been around this website for any period of time, you’ll notice no testimonials. Why?
Testimonials are a source of pride for many but it is also a source of hacking and targets for their clients. You might be surprised to find out how much information a hacker can learn about a company through their testimonials.
Hackers Can Use Testimonials to Find Weaknesses
Every business does their own thing and does it slightly differently than the other people in the same field, IT services is no different. By analyzing what that person does and how that company does it a person could get into that client’s network and utilize their weaknesses get into their infrastructure.
So we don’t post any testimonials to our web page nor to our Facebook page. It is considered a medium risk when it comes to data security and compliance.
Once a hacker knows how the infrastructure is established and how the systems are setup that information could be used to penetrate and destroy that network.
Security Over Celebrity
In one of our previous blog posts, we posted about how a data breach at the source of an RMM service called Continuum caused havoc throughout the MSP world by giving them unfettered access to all the resources to all their MSPs.
That was bad and still continues to be bad for those affected clients.
You’ll never see a solicited post for a testimonial on our public pages. Think of us as the strong, silent type. Want to learn more? Contact us.