Visual Torch

Visual Torch is a Security Consulting firm focused on helping your business protect your information

05/08/2024

Looking to secure your business? Take the first step by conducting a Cybersecurity Risk Assessment.

Risk Assessments allow you to identify, estimate and prioritize threats to your data and systems.

Watch the full video on YouTube, where we discuss how to conduct a Cybersecurity Risk Assessment 🔒🛡️🚀📈⠀

https://youtu.be/619_kxuouRM

03/08/2024

Make sure to update your Apple Devices to 17.4!!!

The update patches 2 security vulnerabilities that attackers have been using to exploit devices before Apple knew about them.

There's also bug fixes and transcripts for Apple Podcasts.

Plus there's new emojis!

01/10/2024

Happy New Year! Just using MFA, strong passwords and updating devices is not enough to keep your business secure. In this video we'll discuss how to take your security efforts to the next level 🔒🛡️🚀📈



https://youtu.be/Xbv_tQTCLew

Why You Should Update Your Devices 10/27/2023

Did you know that keeping your devices up to date is one of the most important things you can do to stay secure? We'll discuss why you should update your devices often and more.

- YouTube

Why You Should Update Your Devices Keep our devices up to date is one of the easiest yet important thing we can do to keep oursleves secure. In this video we discuss the importance of updatein...

How Multifactor Authentication Can Keep You Protected 10/11/2023

Enabling Multifactor Authentication can provide an additional layer of security to your accounts. In this video we'll discuss what Multifactor Authentication is and which methods are the best to use.

- YouTube

How Multifactor Authentication Can Keep You Protected Enabling Multifactor Authentication can provide an additional layer of security to your accounts. We'll discuss what Multifactor Authentication is and which ...

10/04/2023

Creating strong passwords is the first step to securing your accounts. Here are some ways to make sure you have a strong password 💪.



https://youtu.be/vrd2Z_kCzBc

Timeline photos 02/17/2022

Mark Dean, Ph.D is an African American inventor who is credited with developing some of the most impactful technologies we use today. He joined IBM in 1980 where he holds 3 of the company's 9 original patents. During his time at IBM he helped develop the ISA bus which allowed devices like printers and monitors to be plugged directly into the computer. Mark also developed the color monitor and the first 1Ghz Chip. In 1996 he was the first African American to be named an IBM Fellow.

👨‍💻 Follow Visual Torch for more content on ⠀
📍 Share our page to help keep your family and businesses safe⠀⠀⠀⠀⠀⠀

02/01/2022

Happy Month ✊🏾

This month we celebrate the triumphs, as well as, recognize the struggles of the African American community throughout US History. As a we strive towards continued excellence daily.

We will be highlighting some of the African American pioneers in technology and cybersecurity throughout the month.

👨🏾‍💻Follow for more content on ⠀ ⠀

📍Share our page to help keep your family and businesses safe.⠀⠀⠀⠀⠀

Timeline photos 11/09/2021

The first line of defense in protecting your network is to install a firewall. Firewalls help separate your network from the outside internet.

Without a firewall your network is accepting every connection that tries to come in. Each connection is analyzed based a set of rules and only the ones allow can come through.

It is important to note that firewalls must be configured to effectively protect you. Default configurations of firewall are less restrictive, making you more susceptible to compromise

While firewalls are the first line of defense, they are not the only thing needed to secure your network. Combining them with other security solutions strengthen your network.

👨‍💻 Follow us for more content on

📍 Share our page to help keep your family and businesses safe

Timeline photos 10/26/2021

One of the most difficult cyberattacks to detect is the Advanced Persistent Threat (APT). Unlike a normal breach the goal of an APT is to gain access to a network and remain their undetected for an extended amount of time.

Majority of APTs occur from a successful phishing attack. Vulnerabilities in application and misconfigured systems could also lead to an APT.

Once inside a network, attackers can monitor communications, collect data, and even install malware. Cybercriminal also look to escalate privileges and move around the network to gain access to more systems.

During the attack, cybercriminal gain initial access, try to elevate their privileges for greater access and move around to avoid detection. Access is gained through phishing emails, application vulnerabilities or system misconfiguration.

While APTs can be difficult to detect there are signs that it could be happening:

1. Unusual activity on user or service accounts 🕵️‍♂️.

2. Presence of malware such as a Trojan Horse 👾

3. Odd database behavior 📊

4. Unusual data files appearing 🗃️.

If you would like to know more about protecting your business from APTs reach out to us. LINK IN BIO

👨‍💻 Follow for more content on

📍 Share our page to help keep your family and businesses safe

Timeline photos 10/19/2021

One question that I get asked repeatedly is how to secure my accounts like Facebook and Instagram.

The answer is to turn on Multifactor Authentication (MFA) or Two-Factor Authentication (2FA).

While MFA seems like an annoying extra step when logging in, it can be a powerful tool to thwart cybercriminals.

In the event they can get a hold of your credentials they still will not be able to log in if the One-Time Passcode (OTP) is being sent to a device in your possession.

Don’t wait! Secure your accounts today. Turn on MFA/2FA

👨‍💻 Follow us for more content on

📍 Share our page to help keep your family and businesses safe

Timeline photos 10/15/2021

Contrary to popular belief, the responsibility of cybersecurity does not fall solely on the IT Department.

In the event of a cybersecurity incident the IT department is not the only one affected. The business can suffer financial loss, reputation loss and more.

Because of this, cybersecurity is a shared responsibility where everyone in the various business units need to be aligned.

The business must determine the types of risk acceptable when it comes to protecting their assets.

This means they must determine the probability that an asset may go down and what impact it will have on business operations. And then agree if that level of risk is acceptable.

Once the risk is accepted, the business can then create mitigation plans and properly fund them.

However the steps to alignment doesn't stop there. The business has other steps to take such as assigning data owners, documenting processes, providing training and more.

👨🏾‍💻Follow for more content on

📍Share our page to help keep your family and businesses safe

Timeline photos 10/13/2021

Remember that email that went around back in the day from a Nigerian Prince that wanted to transfer you a large sum of money? Everyone should realize by know that it’s a scam, right?

What if I told you that is still running strong and making a over $700K a year?

Even though this is a well-known scam, people keep falling for it every year.

While emails have evolved since this, they still follow some common theme that will help you spot them:

🆘 They will always create an urgent call to action, try to play to your emotions or threaten you.

🔎 Frequent spelling error and bad grammar can be found throughout the message.

🔐 They will ask you to provide sensitive information, click on a link or open an attachment.


Use these tips the next time you suspect you received a phishing email

👨‍💻 Follow for more content on

📍 Share our page to help keep your family and businesses safe

Timeline photos 10/12/2021

Phishing attacks are one of the most successful ways that cybercriminals can steal our information and hack systems.

According to Verizon’s 2021 Data Breach report, 36% of all reported breaches last year involved phishing.

Phishing can come in various forms of communication such as email, text messages, phone calls, social networks, and apps.

It is important to be aware of potentially malicious messages.

👨‍💻 Follow for more content on

📍 Share our page to help keep your family and businesses safe

Timeline photos 10/06/2021

has officially kicked off and we’re here to give you tips on how to

Earlier this week we survived the Facebook outage that put a pause to a big part of our digital life. It made us all realize just how reliant we are on our apps and their providers.

From banking to social media, our digital life is stored across multiple platforms. This includes sensitive information that could be detrimental if fallen into the wrong hands.

I know what you’re thinking “My information is already out there so what if they get more of it”

The impact of stolen personal information is more than just an email notification from a vendor or spam calls.

With the right combination of your information, cybercriminals can:

Perform fraudulent transactions from your bank accounts.
File fraudulent tax returns.
Apply for loans.
Attempt to blackmail or extort you.

Use these tips as the first steps to help protect your digital life.

08/19/2021

🚨Security News Alert🚨

T-Mobile's investigation of the breach has found that 48.6 Million current, former and perspective clients personal information was exposed. The majority of the information seem to have been from former or perspective customers. The exposed information is believed to include first and last names, dates of birth, SSN and driver’s license/ID information.

In order to protect yourself, T-Mobile recommends changing your password and PIN. They are also offering McAfee ID Theft Protection free for 2 years.

When data like this is exposed you can run the risk of:

1. Identity Theft
2. Account Takeover
3. SIM Swapping

In a SIM swapping attack, a criminal will pose as the customer and get the sales staff into transferring a phone number to a SIM they have. This gives them access to text messages and calls. This includes 2FA code sent via text.

08/17/2021

🚨Security News Alert🚨

T-Mobile is investigating a data breach that they announced yesterday.

If the threat actors claims are true data related over 100 Million people was stolen. This includes SSN, phone numbers, addresses and names.

This would be the largest data breach amongst the largest carriers ever.

Be sure to monitor your credit just in case.

07/28/2021

🚨Update Announcement🚨

Apple has released an update for iOS, iPadOS and MacOS to fix a Zero-Day Vulnerability.

Make sure to update your devices to the following versions:
iOS and iPadOS 14.7.1
MacOS Big Sur 11.5.1

07/20/2021

Do you see the latest cyber attack on the news and wonder why it’s never the student loans?

We discuss why it would be difficult to hack a student load provider and what their real targets is 🎯

If you need help securing your business or data feel free to reach out to us.

07/20/2021

Do you see the latest cyber attack on the news and wonder why it’s never the student loans?

We discuss why it would be difficult to hack a student load provider and what their real targets is

If you need help securing your business or data feel free to reach out to us.

Microsoft Releases Out-of-Band Security Updates for PrintNightmare | CISA 07/09/2021

Microsoft has released a patch to address the the PrintNightmare Vulnerability. This patch does not include Windows 10 version 1607, Windows Server 2012, or Windows Server 2016.

Make sure to test and install your patches.

https://us-cert.cisa.gov/ncas/current-activity/2021/07/06/microsoft-releases-out-band-security-updates-printnightmare

Microsoft Releases Out-of-Band Security Updates for PrintNightmare | CISA Microsoft has released out-of-band security updates to address a remote code ex*****on (RCE) vulnerability—known as PrintNightmare (CVE-2021-34527)—in the Windows Print spooler service. According to the CERT Coordination Center (CERT/CC), “The Microsoft Windows Print Spooler service fails to r...

05/12/2021

The release of FireEye, Inc. threat research on the Colonial Pipeline Hack is a reminder to stay on top of patches.

DarkSide was able to exploit CVE-2021-20016, a 0-Day Vulnerability within SonicWall SMA100 SSL VPN product that has been patched by SonicWall.

Vendors often release security advisories when vulnerabilities are found within their products.

It is good practice to sign up for these security advisory emails. Most can be Googled or found on the vendor's website.

US CERT also releases a weekly security advisory too.

03/10/2021

If you’re using Microsoft Exchange Server make sure to update them immediately.

Microsoft has released emergency patches for recently discovered zero-day vulnerabilities

02/15/2021

Securing your online business doesn't have to be a hassle.

Here are some tips to protect your business.

Let’s discuss how we can help your business develop cybersecurity strategies to improve business performance.

01/18/2021

Happy New Year 🎉🍾🎉

With 2020 behind us here’s a look at the Top 4 Cybersecurity Trends for 2021.

Let’s discuss how we can help you develop Cybersecurity strategies to improve business performance.

Why Healthcare Organizations Need to Prioritize Cybersecurity 12/17/2020

Healthcare organizations often face threats that could impact patient safety and sensitive data.

In our latest blog we discuss how they can keep secure by prioritizing Cybersecurity.



https://visualtorch.com/why-healthcare-organizations-need-to-prioritize-cybersecurity/

Why Healthcare Organizations Need to Prioritize Cybersecurity Healthcare organizations are often targeted by cybercriminals. Here is why they should start prioritizing cybersecurity.

How to Keep Yourself Secure This Holiday Season - Visual Torch 12/03/2020

With the holiday season in full swing it’s important to learn how to keep yourself secure online.

Here’s some tips to stay safe while shopping online.



https://visualtorch.com/how-to-keep-yourself-secure-this-holiday-season/

How to Keep Yourself Secure This Holiday Season - Visual Torch With the holiday season here, it is important to remain safe. Due to COVID-19, shoppers are preparing to shop earlier and online. As a result, cybercrime and card-not-present fraud could increase. Use the following tips to help keep you and your family safe. Be on the Lookout for Scams. Cybercrimina...

Home - Visual Torch 11/28/2020

Happy !!!

If you are looking for cybersecurity services, we help businesses develop and implement cybersecurity strategies to reduce risk and improve business performance.

https://VisualTorch.com

Home - Visual Torch Protect Your Data Looking to Protect Your Data? As technology constantly evolves around us, our data is being stored in more places than ever before. From clients requiring you to store more of their data to business documents being stored across your environment, there are countless places where yo...

11/10/2020

We’re excited to announce that this Thursday our very own Trenton Brooks will be taking part of a livestream to discuss his journey and experience in Information Security. Tune in at 6pm EST https://www.youtube.com/c/AlphaCyberSecurity

Want your business to be the top-listed Business in McLean?
Click here to claim your Sponsored Listing.

Videos (show all)

Do you see the latest cyber attack on the news and wonder why it’s never the student loans?We discuss why it would be di...

Telephone

Address

1390 Chain Bridge Road
McLean, VA
22101

Other Consulting Agencies in McLean (show all)
Pathfinder Interactive Pathfinder Interactive
McLean, < Founded in 2008,Pathfinder Interactive is your beacon guide partner to maximizing digital media for your marketing needs. Looking towards the future, but inspired by the past, Path...

ConsultNet ConsultNet
10813 S River Front Pkwy
McLean, 84095

ConsultNet serves as personal tech talent managers delivering rewarding career opportunities to help

HumanTouch, LLC HumanTouch, LLC
7918 Jones Branch Drive
McLean, 22102

The HumanTouch in the digital age: Infusing innovation, leadership and the humantouch in sync with our client's mission for over 20 years.

COPIA Leadership COPIA Leadership
1712 Birch Road
McLean, 22101

Cutting edge leadership development programs, leadership coaching and training for your organization.

The-GlobalAcademy The-GlobalAcademy
McLean, 22102

On-Demand Financial Technology Consulting and Custom Corporate Training.

TheTalha TheTalha
7918 Jones Branch Drive, 4th Floor
McLean, 22102

Forte Leadership LLC Forte Leadership LLC
McLean, 22102

Services include leadership development, organization design and development, coaching, facilitation, training and public speaking, strategy planning,

Bladestack.io Bladestack.io
7902 Tysons One Place
McLean, 22102

bladestack.io brings cloud expertise, technology and innovative approaches to your business

PowerSource Solutions PowerSource Solutions
McLean, 22101

Bart is an experienced and trusted executive with industry and advisory credentials

Lateral Insights Lateral Insights
McLean

IT Consulting Services

The Woolf Group Strategic Solutions The Woolf Group Strategic Solutions
McLean, 22102

We are an experienced, comprehensive, results driven firm offering wraparound government relations, non-profit and business startup and development, grant acquisition services, and...

Finconoso Finconoso
1775 Tysons Boulevard
McLean, 22102

We are a startup and small to mid-size business-focused accounting firm specializing in providing ou