Connecticut Information Security is a full-service Cyber Security Firm

We specialize in identifying security risks, protecting client networks, and aligning organizations with security standards.

PROTECT YOUR BUSINESS.
MITIGATE YOUR RISKS.

Dealing with security attacks has become a fact of doing business online. With the introduction of regulations to protect data, this has become a critical area for businesses today.

Know your risks. Protect your data. Become compliant.

IT Security Healthcheck

NARC® Deception Technology

Services

CTInfoSec has extensive experience performing security assessments in a variety of industries including insurance, financial services, mobile applications, healthcare, online services, manufacturing, utilities, real estate, business services, and more. It is our focus on the uniqueness of each client that allows us to create a lasting impact and superior output.

Recent Blog Posts

  • Creating a Cybersecurity Program from Scratch

    Creating a Cybersecurity Program from Scratch

    In today’s digital age, creating a robust cybersecurity program is essential for protecting your organization’s data and reputation. Developing a cybersecurity program from scratch can be a significant undertaking, but with careful planning and management, it can be done effectively. Here is one pathway to consider: Plan Your Approach Before getting too far into planning,…

    Read more: Creating a Cybersecurity Program from Scratch
  • AI Under Scrutiny: Evaluating and Mitigating Key Security Risks

    AI Under Scrutiny: Evaluating and Mitigating Key Security Risks

    As Artificial Intelligence (AI) becomes increasingly integral to daily operations, ensuring its security is paramount. Testing the security of Large Learning Models (LLMs) has evolved into a complex task, necessitating new tools and playbooks that are still under development. A common question we encounter is: What are the known risks to AI today, and how…

    Read more: AI Under Scrutiny: Evaluating and Mitigating Key Security Risks
  • Beyond the Main Gate: Securing Overlooked Authentication Paths 

    Beyond the Main Gate: Securing Overlooked Authentication Paths 

    The 1983 movie WarGames taught us that “Back doors are not secrets!” This remains true today, as many previously undocumented or secondary access methods are regularly uncovered and disclosed. These hidden access types can range from hard-coded credentials to authentication bypasses. While the issues often stem from exploits or poor coding practices, sometimes they are…

    Read more: Beyond the Main Gate: Securing Overlooked Authentication Paths